Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1530781
MD5:73fb1da6c85604b6cd17ac7334ec9aa4
SHA1:84901db0a0c7b7b0b1e9ea6d8c95e26b5c89f0a8
SHA256:7732b8796639a17e832ef1a3bb9bce24818f87910c70c661d4ff88508b16618c
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 3716 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 73FB1DA6C85604B6CD17AC7334EC9AA4)
    • taskkill.exe (PID: 7148 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 2464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 1960 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 2672 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 1488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 5064 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 5436 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 2860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 6596 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 5556 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 3680 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 2380 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c14e869-f22e-404d-808f-35b8a7c9dc63} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc77d6db10 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7544 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4160 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7433fba-7232-4ec4-b493-79a0f3f4b22b} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a533910 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 8072 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4984 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5076 -prefMapHandle 5072 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7d976b1-7973-4dff-9762-38c41794fbe0} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a2af710 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.2093134086.0000000001547000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    00000000.00000003.2093042238.000000000153F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
      Process Memory Space: file.exe PID: 3716JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: file.exeReversingLabs: Detection: 23%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
        Source: file.exeJoe Sandbox ML: detected
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:49720 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49719 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:49723 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49844 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:49845 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 52.222.236.23:443 -> 192.168.2.5:49846 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49854 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49855 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49856 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:49857 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 142.250.81.238:443 -> 192.168.2.5:63900 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:63990 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:63989 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:64002 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:64003 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:64001 version: TLS 1.2
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.14.dr
        Source: Binary string: wshbth.pdbGCTL source: firefox.exe, 0000000E.00000003.2196118943.000001CC051B1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000E.00000003.2191520506.000001CC051B7000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wshbth.pdb source: firefox.exe, 0000000E.00000003.2196118943.000001CC051B1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000E.00000003.2191520506.000001CC051B7000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: netprofm.pdb source: firefox.exe, 0000000E.00000003.2193079647.000001CC051B1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.14.dr
        Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000E.00000003.2193079647.000001CC051B1000.00000004.00000020.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00AFDBBE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ACC2A2 FindFirstFileExW,0_2_00ACC2A2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B068EE FindFirstFileW,FindClose,0_2_00B068EE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00B0698F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AFD076
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AFD3A9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B09642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B09642
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B0979D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B09B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00B09B2B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B05C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00B05C97
        Source: firefox.exeMemory has grown: Private usage: 33MB later: 219MB
        Source: unknownNetwork traffic detected: DNS query count 31
        Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
        Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
        Source: Joe Sandbox ViewIP Address: 52.222.236.23 52.222.236.23
        Source: Joe Sandbox ViewIP Address: 34.160.144.191 34.160.144.191
        Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownTCP traffic detected without corresponding DNS query: 142.250.81.238
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00B0CE44
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: firefox.exe, 0000000E.00000003.2224038867.000001CC142CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.facebook.com/* equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2237641721.000001CC1457A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257366383.000001CC1457A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2252893340.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229159072.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2244880361.000001CC103BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2247152062.000001CC1315D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229159072.000001CC0FFEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2252893340.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229159072.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2252893340.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2244880361.000001CC103BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2228346100.000001CC104EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2224038867.000001CC142CF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2262108196.000001CC08D3E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2263490790.000001CC089EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2237641721.000001CC1457A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257366383.000001CC1457A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2257751832.000001CC10287000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2108720870.000001CC10286000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2257751832.000001CC10287000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2108720870.000001CC10286000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://vk.com/,https://www.youtube.com/,https://ok.ru/,https://www.avito.ru/,https://www.aliexpress.com/,https://www.wikipedia.org/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2252893340.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2244880361.000001CC103BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2247152062.000001CC1315D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2252893340.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2244880361.000001CC103BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2228346100.000001CC104EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://allegro.pl/,https://www.wikipedia.org/,https://www.olx.pl/,https://www.wykop.pl/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://allegro.pl/,https://www.wikipedia.org/,https://www.olx.pl/,https://www.wykop.pl/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.twitter.com (Twitter)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.de/,https://www.ebay.de/,https://www.wikipedia.org/,https://www.reddit.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.amazon.co.uk/,https://www.bbc.co.uk/,https://www.ebay.co.uk/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.amazon.co.uk/,https://www.bbc.co.uk/,https://www.ebay.co.uk/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.twitter.com (Twitter)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.reddit.com/,https://www.wikipedia.org/,https://www.amazon.ca/,https://twitter.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.twitter.com (Twitter)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/L equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/L equals www.twitter.com (Twitter)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.amazon.fr/,https://www.leboncoin.fr/,https://twitter.com/L equals www.youtube.com (Youtube)
        Source: firefox.exe, 00000012.00000002.3900090065.000001F81360C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 00000012.00000002.3900090065.000001F81360C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
        Source: firefox.exe, 00000012.00000002.3900090065.000001F81360C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E970A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F81360C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E970A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F81360C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E970A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F81360C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2237641721.000001CC1457A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257366383.000001CC1457A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://bfdd6cf3-6cd6-4fa2-bc72-2c3d2e7d20f8/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2224038867.000001CC142CF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2262108196.000001CC08D3E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2263490790.000001CC089EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000E.00000003.2237641721.000001CC1457A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257366383.000001CC1457A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com- equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000E.00000003.2260111681.000001CC097CF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298762695.000001CC08DF2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2262108196.000001CC08D9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
        Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: youtube.com
        Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
        Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
        Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: example.org
        Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
        Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
        Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
        Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: www.youtube.com
        Source: global trafficDNS traffic detected: DNS query: www.facebook.com
        Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
        Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
        Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
        Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
        Source: global trafficDNS traffic detected: DNS query: www.reddit.com
        Source: global trafficDNS traffic detected: DNS query: twitter.com
        Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
        Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
        Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
        Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
        Source: firefox.exe, 0000000E.00000003.2291081260.000001CC0FC98000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
        Source: firefox.exe, 0000000E.00000003.2262108196.000001CC08D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.0/
        Source: firefox.exe, 0000000E.00000003.2262108196.000001CC08D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.1/
        Source: firefox.exe, 0000000E.00000003.2262108196.000001CC08D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.0/
        Source: firefox.exe, 0000000E.00000003.2262108196.000001CC08D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.1/
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
        Source: firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
        Source: firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
        Source: firefox.exe, 0000000E.00000003.2180043632.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182063880.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: firefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://compose.mail.yahoo.co.jp/ym/Compose?To=%s
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
        Source: firefox.exe, 0000000E.00000003.2180043632.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182063880.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
        Source: firefox.exe, 0000000E.00000003.2259882097.000001CC09A0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/
        Source: firefox.exe, 0000000E.00000003.2289873934.000001CC13460000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
        Source: firefox.exe, 0000000E.00000003.2300618628.000001CC142A4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2299770378.000001CC08D2D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
        Source: firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2302722455.000001CC13116000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.addEventListener
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267506258.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://exslt.org/common
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7ED61000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2266623526.000001CC7ED61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://exslt.org/dates-and-timesp
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267506258.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://exslt.org/math
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7ED61000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2266623526.000001CC7ED61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://exslt.org/regular-expressions
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267506258.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://exslt.org/sets
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-06/schema#
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-07/schema#-
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
        Source: firefox.exe, 0000000E.00000003.2231141872.000001CC0B8FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2118808417.000001CC09999000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2312787148.000001CC085FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2192361095.000001CC09896000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2101400198.000001CC0A99C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2084081402.000001CC0857A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186838044.000001CC07DFC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2250850623.000001CC09989000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2189523178.000001CC09D3B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2107245932.000001CC7ED8A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2250436949.000001CC09C4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2232455406.000001CC0B833000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2304804466.000001CC0B8FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2180253662.000001CC085F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2083680897.000001CC085F8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2180253662.000001CC085C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2085609798.000001CC085C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2117452497.000001CC0998D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2083590188.000001CC0924E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271552219.000001CC0B8FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2083448115.000001CC085FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
        Source: firefox.exe, 0000000E.00000003.2180043632.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2182063880.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
        Source: firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0C
        Source: firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0N
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ocsp.thawte.com0
        Source: firefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://poczta.interia.pl/mh/?mailto=%s
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0.
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0W
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: firefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
        Source: firefox.exe, 0000000E.00000003.2171081375.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172518773.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186843645.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2170602239.000001CC0517F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2178260006.000001CC05180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2172213733.000001CC0517A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
        Source: firefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.inbox.lv/rfc2368/?value=%s
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: http://www.mozilla.com0
        Source: firefox.exe, 0000000E.00000003.2262108196.000001CC08D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2006/browser/search/
        Source: firefox.exe, 0000000E.00000003.2294089569.000001CC0A205000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2259547161.000001CC09A40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2102004659.000001CC0A8E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2234435372.000001CC0A659000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2107245932.000001CC7ED43000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2234348129.000001CC0A679000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
        Source: firefox.exe, 0000000E.00000003.2234348129.000001CC0A679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul8
        Source: firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulchrome://global/content/elements/browse
        Source: firefox.exe, 00000011.00000002.3903262153.00000218EA33D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000003.2097569331.00000218EA33D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000003.2097046332.00000218EA33D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000003.2101209347.00000218EA33D000.00000004.00000020.00020000.00000000.sdmp, mozilla-temp-41.14.drString found in binary or memory: http://www.videolan.org/x264.html
        Source: firefox.exe, 0000000E.00000003.2228346100.000001CC10467000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230122571.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: firefox.exe, 0000000E.00000003.2228346100.000001CC10467000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230122571.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: firefox.exe, 0000000E.00000003.2244880361.000001CC103BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://youtube.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
        Source: firefox.exe, 0000000E.00000003.2233059790.000001CC0B6C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
        Source: firefox.exe, 0000000E.00000003.2225555390.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241506163.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
        Source: firefox.exe, 0000000E.00000003.2230329261.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2247686341.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2290406837.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF40000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2234040156.000001CC0A6B0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2193313658.000001CC09F83000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2218082126.000001CC0AC20000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2184020731.000001CC0AC1D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2251977757.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
        Source: firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
        Source: firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/enhancer-for-youtube/
        Source: firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/facebook-container/
        Source: firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
        Source: firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/to-google-translate/
        Source: firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/wikipedia-context-menu-search/
        Source: firefox.exe, 0000000E.00000003.2289706754.000001CC13493000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads-us.rd.linksynergy.com/as.php
        Source: firefox.exe, 0000000E.00000003.2258097011.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264240758.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298762695.000001CC08DF2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2262108196.000001CC08D9D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2234745197.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2299770378.000001CC08D2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://allegro.pl/
        Source: firefox.exe, 0000000E.00000003.2252828113.000001CC10374000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://amazon.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
        Source: firefox.exe, 0000000E.00000003.2289873934.000001CC13460000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2289916574.000001CC13457000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2225555390.000001CC13EBA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2260111681.000001CC097A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
        Source: firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132668557.000001CC08C6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
        Source: firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132668557.000001CC08C6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
        Source: firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
        Source: firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
        Source: firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
        Source: firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132668557.000001CC08C6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
        Source: firefox.exe, 0000000E.00000003.2250436949.000001CC09C4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1694699#c21
        Source: firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
        Source: firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
        Source: firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
        Source: firefox.exe, 0000000E.00000003.2244880361.000001CC103BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298052771.000001CC090F8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2261724889.000001CC090FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net
        Source: firefox.exe, 0000000E.00000003.2296102895.000001CC10277000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/
        Source: firefox.exe, 0000000E.00000003.2296019620.000001CC1034D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229159072.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271083051.000001CC0FF9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
        Source: firefox.exe, 0000000E.00000003.2252893340.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2270550989.000001CC0FFA1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229159072.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/
        Source: firefox.exe, 0000000E.00000003.2252893340.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2270550989.000001CC0FFA1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229159072.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/0
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
        Source: firefox.exe, 0000000E.00000003.2225555390.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241506163.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datastudio.google.com/embed/reporting/
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
        Source: firefox.exe, 0000000E.00000003.2224328554.000001CC14258000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2300618628.000001CC14258000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
        Source: firefox.exe, 0000000E.00000003.2224328554.000001CC14258000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2300618628.000001CC14258000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
        Source: firefox.exe, 0000000E.00000003.2224328554.000001CC14258000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2300618628.000001CC14258000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/setPointerCaptureElementReleaseCaptureWarningElem
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#EncryptionPreventDefaultFromP
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
        Source: firefox.exe, 0000000E.00000003.2118808417.000001CC09999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2120672678.000001CC09C9D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2254320054.000001CC0FCB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?t=ffab&q=
        Source: firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/y
        Source: firefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186838044.000001CC07D70000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249476814.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307404878.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
        Source: firefox.exe, 0000000E.00000003.2186838044.000001CC07D70000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249476814.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307404878.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
        Source: firefox.exe, 0000000E.00000003.2224328554.000001CC14258000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2300618628.000001CC14258000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://extensionworkshop.com/documentation/publish/self-distribution/SelectOptionsLengthAssignmentW
        Source: firefox.exe, 0000000E.00000003.2244529916.000001CC123A7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E9712000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F813613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
        Source: firefox.exe, 0000000E.00000003.2111520270.000001CC12AD1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2110675273.000001CC0964B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
        Source: firefox.exe, 0000000E.00000003.2246347892.000001CC13EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com
        Source: firefox.exe, 0000000E.00000003.2246347892.000001CC13EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
        Source: firefox.exe, 0000000E.00000003.2241506163.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
        Source: firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
        Source: firefox.exe, 0000000E.00000003.2244529916.000001CC123A7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E9712000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F813613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
        Source: firefox.exe, 00000012.00000002.3900090065.000001F8136C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
        Source: firefox.exe, 00000012.00000002.3900090065.000001F8136C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
        Source: firefox.exe, 00000011.00000002.3899885771.00000218E972F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F813630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
        Source: firefox.exe, 00000012.00000002.3900090065.000001F8136C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
        Source: firefox.exe, 0000000E.00000003.2290406837.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
        Source: firefox.exe, 00000012.00000002.3900090065.000001F8136C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
        Source: firefox.exe, 0000000E.00000003.2244880361.000001CC103EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/cfworker
        Source: firefox.exe, 0000000E.00000003.2112031252.000001CC096B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/cfworkeri~t
        Source: firefox.exe, 0000000E.00000003.2075675303.000001CC08253000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
        Source: firefox.exe, 0000000E.00000003.2225555390.000001CC13ED8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2240371137.000001CC13ED8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2301462955.000001CC13EDC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2246347892.000001CC13EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
        Source: firefox.exe, 0000000E.00000003.2123795864.000001CC0ACC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2244339063.000001CC1312F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
        Source: firefox.exe, 0000000E.00000003.2255193837.000001CC09AC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307152473.000001CC09ACF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/H
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/HCX
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
        Source: firefox.exe, 0000000E.00000003.2271501433.000001CC0FD89000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230329261.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2247686341.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
        Source: prefs-1.js.14.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
        Source: firefox.exe, 0000000E.00000003.2226896405.000001CC139EE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267506258.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
        Source: firefox.exe, 0000000E.00000003.2244529916.000001CC12351000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E9789000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F8136F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
        Source: firefox.exe, 0000000E.00000003.2251977757.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/6f2893d4-ca0b-4b68-8f1d-13675
        Source: firefox.exe, 0000000E.00000003.2243014629.000001CC13E30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2177392164.000001CC1471C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/messaging-system/1/7755ad51-2370-4623-
        Source: firefox.exe, 0000000E.00000003.2225555390.000001CC13E9C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257366383.000001CC1457A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/metrics/1/dbe32737-a1a6-4718-9e84-e04d
        Source: firefox.exe, 0000000E.00000003.2300474967.000001CC14593000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2237641721.000001CC1457A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257366383.000001CC1457A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/b714e298-85f7-46bc
        Source: firefox.exe, 0000000E.00000003.2300474967.000001CC14593000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2237641721.000001CC1457A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257366383.000001CC1457A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/be211487-be32-4da6
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
        Source: firefox.exe, 0000000E.00000003.2304380560.000001CC102A1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2108594997.000001CC102AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2100644587.000001CC102AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema.
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema./
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/=
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
        Source: firefox.exe, 0000000E.00000003.2298408943.000001CC08FEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
        Source: firefox.exe, 0000000E.00000003.2233059790.000001CC0B6C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
        Source: firefox.exe, 0000000E.00000003.2233059790.000001CC0B6C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
        Source: firefox.exe, 0000000E.00000003.2225555390.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241506163.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lookerstudio.google.com/embed/reporting/
        Source: firefox.exe, 0000000E.00000003.2186838044.000001CC07D70000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249476814.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307404878.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
        Source: firefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186838044.000001CC07D70000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249476814.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307404878.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
        Source: firefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186838044.000001CC07D70000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249476814.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307404878.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
        Source: firefox.exe, 00000011.00000002.3899885771.00000218E9786000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F81368F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com
        Source: firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ok.ru/
        Source: firefox.exe, 0000000E.00000003.2186838044.000001CC07D70000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249476814.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307404878.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
        Source: firefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186838044.000001CC07D70000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249476814.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307404878.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
        Source: firefox.exe, 0000000E.00000003.2268434284.000001CC1349D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com
        Source: firefox.exe, 0000000E.00000003.2296063756.000001CC10285000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com/
        Source: firefox.exe, 0000000E.00000003.2291081260.000001CC0FC98000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
        Source: firefox.exe, 0000000E.00000003.2260111681.000001CC097A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
        Source: firefox.exe, 0000000E.00000003.2265328825.000001CC7F6B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com
        Source: firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
        Source: firefox.exe, 0000000E.00000003.2118808417.000001CC09999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
        Source: firefox.exe, 0000000E.00000003.2303427857.000001CC10467000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2228346100.000001CC10467000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
        Source: firefox.exe, 0000000E.00000003.2244339063.000001CC1312F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2228346100.000001CC104C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
        Source: firefox.exe, 0000000E.00000003.2260111681.000001CC09785000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
        Source: firefox.exe, 0000000E.00000003.2307152473.000001CC09ACF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
        Source: firefox.exe, 0000000E.00000003.2299770378.000001CC08D2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/facebook.svg
        Source: firefox.exe, 0000000E.00000003.2299770378.000001CC08D2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/play.svg
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FFEA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FFEA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2270343208.000001CC0FFEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
        Source: firefox.exe, 0000000E.00000003.2259296026.000001CC09A50000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E9712000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F813613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
        Source: firefox.exe, 0000000E.00000003.2259296026.000001CC09A50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
        Source: firefox.exe, 0000000E.00000003.2244529916.000001CC12351000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E9789000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F8136F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
        Source: firefox.exe, 0000000E.00000003.2262108196.000001CC08D52000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298762695.000001CC08D52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
        Source: firefox.exe, 0000000E.00000003.2262108196.000001CC08D52000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298762695.000001CC08DF2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298762695.000001CC08D52000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2262108196.000001CC08D9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
        Source: firefox.exe, 0000000E.00000003.2265328825.000001CC7F6B1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2263685184.000001CC089E0000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.14.drString found in binary or memory: https://support.mozilla.org
        Source: firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
        Source: firefox.exe, 0000000E.00000003.2258097011.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264240758.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2302722455.000001CC13116000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2234745197.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
        Source: firefox.exe, 0000000E.00000003.2307251663.000001CC09AB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
        Source: firefox.exe, 0000000E.00000003.2247152062.000001CC1315D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2303058894.000001CC123BF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2243014629.000001CC13E30000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2244143636.000001CC13156000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2244529916.000001CC123BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2224101036.000001CC142C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2302622561.000001CC1316D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
        Source: firefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.14.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsMediaPlatformDecoderNotFound
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsMediaWMFNeeded
        Source: firefox.exe, 0000000E.00000003.2095672287.000001CC0B7DF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186779349.000001CC0B7E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings
        Source: firefox.exe, 0000000E.00000003.2102004659.000001CC0A8C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2297131286.000001CC0A8C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
        Source: places.sqlite-wal.14.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.
        Source: firefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-3.1
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc7515#appendix-C)
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
        Source: firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://truecolors.firefox.com/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://vk.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
        Source: firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
        Source: firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://watch.sling.com/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2120672678.000001CC09C9D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bbc.co.uk/
        Source: firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ctrip.com/
        Source: gmpopenh264.dll.tmp.14.drString found in binary or memory: https://www.digicert.com/CPS0
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.co.uk/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.de/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
        Source: firefox.exe, 0000000E.00000003.2230329261.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2247686341.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FD74000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271414505.000001CC0FDAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
        Source: firefox.exe, 0000000E.00000003.2096476779.000001CC1012A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10227000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075675303.000001CC08253000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
        Source: firefox.exe, 0000000E.00000003.2075965345.000001CC0828A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075675303.000001CC08253000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2120672678.000001CC09C9D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
        Source: firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ifeng.com/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.iqiyi.com/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
        Source: firefox.exe, 0000000E.00000003.2290839020.000001CC0FD3D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2263685184.000001CC089E0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257793140.000001CC0FD39000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.14.drString found in binary or memory: https://www.mozilla.org
        Source: firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
        Source: firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
        Source: places.sqlite-wal.14.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.
        Source: firefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
        Source: firefox.exe, 0000000E.00000003.2111520270.000001CC12AD1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2110675273.000001CC0964B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
        Source: firefox.exe, 0000000E.00000003.2289790004.000001CC13468000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/anything/?
        Source: places.sqlite-wal.14.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.
        Source: firefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
        Source: firefox.exe, 0000000E.00000003.2307251663.000001CC09AB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
        Source: firefox.exe, 0000000E.00000003.2226896405.000001CC139EE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2289706754.000001CC13493000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.14.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
        Source: firefox.exe, 0000000E.00000003.2261104773.000001CC09491000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298052771.000001CC090E7000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.14.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
        Source: firefox.exe, 0000000E.00000003.2307251663.000001CC09AB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
        Source: firefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.14.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
        Source: firefox.exe, 0000000E.00000003.2261104773.000001CC09491000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298052771.000001CC090E7000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.14.drString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
        Source: firefox.exe, 0000000E.00000003.2266623526.000001CC7ED5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2107245932.000001CC7ED5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F8136F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
        Source: firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
        Source: firefox.exe, 00000010.00000002.3900138282.000001502E2C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/US
        Source: firefox.exe, 0000000E.00000003.2229159072.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2252893340.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271150908.000001CC0FF56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
        Source: firefox.exe, 0000000E.00000003.2261104773.000001CC09491000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.14.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: firefox.exe, 00000011.00000002.3899885771.00000218E97C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/qk~
        Source: firefox.exe, 0000000E.00000003.2233059790.000001CC0B6C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.openh264.org/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
        Source: firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
        Source: firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
        Source: firefox.exe, 00000012.00000002.3900090065.000001F81360C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
        Source: firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
        Source: firefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xhr.spec.whatwg.org/#sync-warning
        Source: firefox.exe, 0000000E.00000003.2271820625.000001CC0A9EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
        Source: firefox.exe, 0000000E.00000003.2231141872.000001CC0B880000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
        Source: recovery.jsonlz4.tmp.14.drString found in binary or memory: https://youtube.com/account?=
        Source: file.exe, 00000000.00000003.2093042238.000000000155F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2093823249.000000000155F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2094165248.000000000155F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2095704140.000000000155F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=htt==
        Source: firefox.exe, 00000012.00000002.3902165408.000001F8137D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.co
        Source: firefox.exe, 0000000E.00000003.2271820625.000001CC0A9EC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3901984238.000001502E334000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899721129.000001502E05A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899721129.000001502E050000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3898425869.00000218E9410000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3902014551.00000218E9844000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3898425869.00000218E941A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3899602724.000001F8133FA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3899602724.000001F8133F0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902165408.000001F8137D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
        Source: firefox.exe, 0000000C.00000002.2064381457.000002BC97C47000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000002.2070488716.000001521E587000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
        Source: firefox.exe, 00000010.00000002.3901984238.000001502E334000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899721129.000001502E050000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3898425869.00000218E9410000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3902014551.00000218E9844000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3899602724.000001F8133F0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902165408.000001F8137D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
        Source: firefox.exe, 0000000E.00000003.2269250913.000001CC134F1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2251977757.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdp
        Source: firefox.exe, 00000011.00000002.3898425869.00000218E941A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdt
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 63919 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 64002 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 64000 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 63989 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 63999 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 64003 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
        Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
        Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
        Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64000
        Source: unknownNetwork traffic detected: HTTP traffic on port 64001 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 63900 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63900
        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63989
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63919
        Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63999
        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64002
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63990
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64001
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
        Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 63990 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64003
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:49720 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49719 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.5:49723 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49844 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:49845 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 52.222.236.23:443 -> 192.168.2.5:49846 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49854 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49855 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.5:49856 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.5:49857 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 142.250.81.238:443 -> 192.168.2.5:63900 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:63990 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:63989 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:64002 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:64003 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.5:64001 version: TLS 1.2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B0EAFF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B0ED6A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B0EAFF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00AFAA57
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B29576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B29576

        System Summary

        barindex
        Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
        Source: file.exe, 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a092e895-6
        Source: file.exe, 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_56b44561-c
        Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3b2a6ab6-2
        Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0b2826ce-2
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_00000218E98021F2 NtQuerySystemInformation,17_2_00000218E98021F2
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_00000218E9808E77 NtQuerySystemInformation,17_2_00000218E9808E77
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00AFD5EB
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00AF1201
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00AFE8F6
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A980600_2_00A98060
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B020460_2_00B02046
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF82980_2_00AF8298
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ACE4FF0_2_00ACE4FF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AC676B0_2_00AC676B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B248730_2_00B24873
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ABCAA00_2_00ABCAA0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9CAF00_2_00A9CAF0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AACC390_2_00AACC39
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AC6DD90_2_00AC6DD9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAD0640_2_00AAD064
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A991C00_2_00A991C0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAB1190_2_00AAB119
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB13940_2_00AB1394
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB17060_2_00AB1706
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB781B0_2_00AB781B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB19B00_2_00AB19B0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A979200_2_00A97920
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA997D0_2_00AA997D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB7A4A0_2_00AB7A4A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB7CA70_2_00AB7CA7
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB1C770_2_00AB1C77
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AC9EEE0_2_00AC9EEE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B1BE440_2_00B1BE44
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB1F320_2_00AB1F32
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_00000218E98021F217_2_00000218E98021F2
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_00000218E9808E7717_2_00000218E9808E77
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_00000218E980291C17_2_00000218E980291C
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_00000218E980223217_2_00000218E9802232
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 00A99CB3 appears 31 times
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 00AAF9F2 appears 40 times
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 00AB0A30 appears 46 times
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: classification engineClassification label: mal72.troj.evad.winEXE@34/41@73/12
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B037B5 GetLastError,FormatMessageW,0_2_00B037B5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF10BF AdjustTokenPrivileges,CloseHandle,0_2_00AF10BF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00AF16C3
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B051CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B051CD
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFD4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00AFD4DC
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00B0648E
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A942A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00A942A2
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2860:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2464:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6008:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6176:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1488:120:WilError_03
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
        Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2225555390.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241506163.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;
        Source: firefox.exe, 0000000E.00000003.2225555390.000001CC13EC8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;Fy6
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;-
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9'
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9
        Source: firefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2268258792.000001CC13964000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
        Source: file.exeReversingLabs: Detection: 23%
        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
        Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c14e869-f22e-404d-808f-35b8a7c9dc63} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc77d6db10 socket
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4160 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7433fba-7232-4ec4-b493-79a0f3f4b22b} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a533910 rdd
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4984 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5076 -prefMapHandle 5072 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7d976b1-7973-4dff-9762-38c41794fbe0} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a2af710 utility
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c14e869-f22e-404d-808f-35b8a7c9dc63} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc77d6db10 socketJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4160 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7433fba-7232-4ec4-b493-79a0f3f4b22b} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a533910 rddJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4984 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5076 -prefMapHandle 5072 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7d976b1-7973-4dff-9762-38c41794fbe0} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a2af710 utilityJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.14.dr
        Source: Binary string: wshbth.pdbGCTL source: firefox.exe, 0000000E.00000003.2196118943.000001CC051B1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000E.00000003.2191520506.000001CC051B7000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: wshbth.pdb source: firefox.exe, 0000000E.00000003.2196118943.000001CC051B1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000E.00000003.2191520506.000001CC051B7000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: netprofm.pdb source: firefox.exe, 0000000E.00000003.2193079647.000001CC051B1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.14.dr
        Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000E.00000003.2193079647.000001CC051B1000.00000004.00000020.00020000.00000000.sdmp
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A942DE
        Source: gmpopenh264.dll.tmp.14.drStatic PE information: section name: .rodata
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB0A76 push ecx; ret 0_2_00AB0A89
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AAF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AAF98E
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B21C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B21C41
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96699
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_00000218E98021F2 rdtsc 17_2_00000218E98021F2
        Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.5 %
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00AFDBBE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ACC2A2 FindFirstFileExW,0_2_00ACC2A2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B068EE FindFirstFileW,FindClose,0_2_00B068EE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00B0698F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AFD076
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AFD3A9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B09642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B09642
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B0979D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B09B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00B09B2B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B05C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00B05C97
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A942DE
        Source: firefox.exe, 00000010.00000002.3902920219.000001502E500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
        Source: firefox.exe, 00000011.00000002.3902243641.00000218E9CB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(o
        Source: firefox.exe, 00000010.00000002.3902920219.000001502E500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
        Source: firefox.exe, 00000011.00000002.3902243641.00000218E9CB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6634-1003_Classes
        Source: firefox.exe, 00000010.00000002.3899721129.000001502E05A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3899602724.000001F8133FA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902389716.000001F8137E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3902286410.000001502E41F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
        Source: firefox.exe, 00000011.00000002.3902243641.00000218E9CB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllfa
        Source: firefox.exe, 00000010.00000002.3899721129.000001502E05A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
        Source: firefox.exe, 00000011.00000002.3902243641.00000218E9CB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: firefox.exe, 00000011.00000002.3898425869.00000218E941A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`E
        Source: firefox.exe, 00000010.00000002.3902920219.000001502E500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllD
        Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 17_2_00000218E98021F2 rdtsc 17_2_00000218E98021F2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0EAA2 BlockInput,0_2_00B0EAA2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AC2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AC2622
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A942DE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB4CE8 mov eax, dword ptr fs:[00000030h]0_2_00AB4CE8
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00AF0B62
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AC2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AC2622
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AB083F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB09D5 SetUnhandledExceptionFilter,0_2_00AB09D5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00AB0C21
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00AF1201
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AD2BA5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFB226 SendInput,keybd_event,0_2_00AFB226
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B122DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00B122DA
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00AF0B62
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00AF1663
        Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
        Source: file.exeBinary or memory string: Shell_TrayWnd
        Source: firefox.exe, 0000000E.00000003.2182447102.000001CC14875000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hSoftware\Policies\Microsoft\Windows\PersonalizationNoChangingStartMenuBackgroundPersonalColors_BackgroundWilStaging_02RtlDisownModuleHeapAllocationRtlQueryFeatureConfigurationRtlRegisterFeatureConfigurationChangeNotificationRtlSubscribeWnfStateChangeNotificationRtlDllShutdownInProgressntdll.dllNtQueryWnfStateDataLocal\SM0:%d:%d:%hs_p0Local\SessionImmersiveColorPreferenceBEGINTHMthmfile\Sessions\%d\Windows\ThemeSectionMessageWindowendthemewndThemeApiConnectionRequest\ThemeApiPortwinsta0SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\PersonalizeAppsUseLightThemeSystemUsesLightThemedefaultshell\themes\uxtheme\render.cppCompositedWindow::WindowdeletedrcacheMDIClientSoftware\Microsoft\Windows\DWMColorPrevalenceSoftware\Microsoft\Windows\CurrentVersion\ImmersiveShellTabletModeMENUAccentColorSoftware\Microsoft\Windows\CurrentVersion\Explorer\AccentDefaultStartColorControl Panel\DesktopAutoColorizationAccentColorMenuStartColorMenuAutoColorSoftware\Microsoft\Windows\CurrentVersion\Themes\History\ColorsSoftware\Microsoft\Windows\CurrentVersion\Themes\HistoryAccentPaletteTab$Shell_TrayWndLocal\SessionImmersiveColorMutex
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB0698 cpuid 0_2_00AB0698
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B08195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00B08195
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AED27A GetUserNameW,0_2_00AED27A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ACB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00ACB952
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A942DE

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000000.00000003.2093134086.0000000001547000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.2093042238.000000000153F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file.exe PID: 3716, type: MEMORYSTR
        Source: file.exeBinary or memory string: WIN_81
        Source: file.exeBinary or memory string: WIN_XP
        Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
        Source: file.exeBinary or memory string: WIN_XPe
        Source: file.exeBinary or memory string: WIN_VISTA
        Source: file.exeBinary or memory string: WIN_7
        Source: file.exeBinary or memory string: WIN_8

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000003.2093134086.0000000001547000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.2093042238.000000000153F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file.exe PID: 3716, type: MEMORYSTR
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B11204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00B11204
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B11806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B11806
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure2
        Valid Accounts
        1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        2
        Disable or Modify Tools
        21
        Input Capture
        2
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        2
        Valid Accounts
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop Protocol21
        Input Capture
        12
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Extra Window Memory Injection
        2
        Obfuscated Files or Information
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin Shares3
        Clipboard Data
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
        Valid Accounts
        1
        DLL Side-Loading
        NTDS16
        System Information Discovery
        Distributed Component Object ModelInput Capture3
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
        Access Token Manipulation
        1
        Extra Window Memory Injection
        LSA Secrets131
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
        Process Injection
        1
        Masquerading
        Cached Domain Credentials1
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Valid Accounts
        DCSync3
        Process Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Virtualization/Sandbox Evasion
        Proc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
        Access Token Manipulation
        /etc/passwd and /etc/shadow1
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
        Process Injection
        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1530781 Sample: file.exe Startdate: 10/10/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 34 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of sandbox detection 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 229 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 142.250.81.238, 443, 63900 GOOGLEUS United States 19->51 53 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49713, 49721, 49722 GOOGLEUS United States 19->53 55 10 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        file.exe24%ReversingLabsWin32.Trojan.Generic
        file.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%0%URL Reputationsafe
        https://datastudio.google.com/embed/reporting/0%URL Reputationsafe
        http://www.mozilla.com00%URL Reputationsafe
        https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.0%URL Reputationsafe
        https://merino.services.mozilla.com/api/v1/suggest0%URL Reputationsafe
        https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect0%URL Reputationsafe
        https://www.leboncoin.fr/0%URL Reputationsafe
        https://spocs.getpocket.com/spocs0%URL Reputationsafe
        https://shavar.services.mozilla.com0%URL Reputationsafe
        https://completion.amazon.com/search/complete?q=0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report0%URL Reputationsafe
        https://ads.stickyadstv.com/firefox-etp0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab0%URL Reputationsafe
        https://monitor.firefox.com/breach-details/0%URL Reputationsafe
        https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/addons/addon/0%URL Reputationsafe
        https://tracking-protection-issues.herokuapp.com/new0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report0%URL Reputationsafe
        https://api.accounts.firefox.com/v10%URL Reputationsafe
        https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield0%URL Reputationsafe
        https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=0%URL Reputationsafe
        https://bugzilla.mozilla.org/show_bug.cgi?id=12662200%URL Reputationsafe
        https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-1520%URL Reputationsafe
        https://mitmdetection.services.mozilla.com/0%URL Reputationsafe
        https://static.adsafeprotected.com/firefox-etp-js0%URL Reputationsafe
        https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL0%URL Reputationsafe
        https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref0%URL Reputationsafe
        https://spocs.getpocket.com/0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/abuse/report/addon/0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%0%URL Reputationsafe
        https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f0%URL Reputationsafe
        https://monitor.firefox.com/user/breach-stats?includeResolved=true0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report0%URL Reputationsafe
        https://safebrowsing.google.com/safebrowsing/diagnostic?site=0%URL Reputationsafe
        https://monitor.firefox.com/user/dashboard0%URL Reputationsafe
        https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID0%URL Reputationsafe
        https://monitor.firefox.com/about0%URL Reputationsafe
        https://account.bellmedia.c0%URL Reputationsafe
        https://login.microsoftonline.com0%URL Reputationsafe
        https://coverage.mozilla.org0%URL Reputationsafe
        http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
        https://www.zhihu.com/0%URL Reputationsafe
        http://x1.c.lencr.org/00%URL Reputationsafe
        http://x1.i.lencr.org/00%URL Reputationsafe
        http://a9.com/-/spec/opensearch/1.1/0%URL Reputationsafe
        https://blocked.cdn.mozilla.net/0%URL Reputationsafe
        https://json-schema.org/draft/2019-09/schema0%URL Reputationsafe
        https://profiler.firefox.com0%URL Reputationsafe
        https://outlook.live.com/default.aspx?rru=compose&to=%s0%URL Reputationsafe
        https://mozilla.cloudflare-dns.com/dns-query0%URL Reputationsafe
        https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings20%URL Reputationsafe
        https://bugzilla.mozilla.org/show_bug.cgi?id=16784480%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        example.org
        93.184.215.14
        truefalse
          unknown
          star-mini.c10r.facebook.com
          157.240.0.35
          truefalse
            unknown
            prod.classify-client.prod.webservices.mozgcp.net
            35.190.72.216
            truefalse
              unknown
              prod.balrog.prod.cloudops.mozgcp.net
              35.244.181.201
              truefalse
                unknown
                twitter.com
                104.244.42.193
                truefalse
                  unknown
                  prod.detectportal.prod.cloudops.mozgcp.net
                  34.107.221.82
                  truefalse
                    unknown
                    services.addons.mozilla.org
                    52.222.236.23
                    truefalse
                      unknown
                      dyna.wikimedia.org
                      185.15.59.224
                      truefalse
                        unknown
                        prod.remote-settings.prod.webservices.mozgcp.net
                        34.149.100.209
                        truefalse
                          unknown
                          contile.services.mozilla.com
                          34.117.188.166
                          truefalse
                            unknown
                            youtube.com
                            142.250.186.142
                            truefalse
                              unknown
                              prod.content-signature-chains.prod.webservices.mozgcp.net
                              34.160.144.191
                              truefalse
                                unknown
                                youtube-ui.l.google.com
                                142.250.186.78
                                truefalse
                                  unknown
                                  us-west1.prod.sumo.prod.webservices.mozgcp.net
                                  34.149.128.2
                                  truefalse
                                    unknown
                                    reddit.map.fastly.net
                                    151.101.65.140
                                    truefalse
                                      unknown
                                      ipv4only.arpa
                                      192.0.0.170
                                      truefalse
                                        unknown
                                        prod.ads.prod.webservices.mozgcp.net
                                        34.117.188.166
                                        truefalse
                                          unknown
                                          push.services.mozilla.com
                                          34.107.243.93
                                          truefalse
                                            unknown
                                            normandy-cdn.services.mozilla.com
                                            35.201.103.21
                                            truefalse
                                              unknown
                                              telemetry-incoming.r53-2.services.mozilla.com
                                              34.120.208.123
                                              truefalse
                                                unknown
                                                www.reddit.com
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  spocs.getpocket.com
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    content-signature-2.cdn.mozilla.net
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      support.mozilla.org
                                                      unknown
                                                      unknownfalse
                                                        unknown
                                                        firefox.settings.services.mozilla.com
                                                        unknown
                                                        unknownfalse
                                                          unknown
                                                          www.youtube.com
                                                          unknown
                                                          unknownfalse
                                                            unknown
                                                            www.facebook.com
                                                            unknown
                                                            unknownfalse
                                                              unknown
                                                              detectportal.firefox.com
                                                              unknown
                                                              unknownfalse
                                                                unknown
                                                                normandy.cdn.mozilla.net
                                                                unknown
                                                                unknownfalse
                                                                  unknown
                                                                  shavar.services.mozilla.com
                                                                  unknown
                                                                  unknownfalse
                                                                    unknown
                                                                    www.wikipedia.org
                                                                    unknown
                                                                    unknownfalse
                                                                      unknown
                                                                      NameSourceMaliciousAntivirus DetectionReputation
                                                                      https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 00000012.00000002.3900090065.000001F8136C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://exslt.org/dates-and-timespfirefox.exe, 0000000E.00000003.2107245932.000001CC7ED61000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2266623526.000001CC7ED61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          http://detectportal.firefox.com/firefox.exe, 0000000E.00000003.2259882097.000001CC09A0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://datastudio.google.com/embed/reporting/firefox.exe, 0000000E.00000003.2225555390.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2241506163.000001CC13E4C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://www.mozilla.com0gmpopenh264.dll.tmp.14.drfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000011.00000002.3899885771.00000218E9786000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F81368F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://json-schema.org/draft/2019-09/schema.firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://www.leboncoin.fr/firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://spocs.getpocket.com/spocsfirefox.exe, 0000000E.00000003.2259296026.000001CC09A50000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://screenshots.firefox.comfirefox.exe, 0000000E.00000003.2265328825.000001CC7F6B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://shavar.services.mozilla.comfirefox.exe, 0000000E.00000003.2244339063.000001CC1312F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2228346100.000001CC104C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://completion.amazon.com/search/complete?q=firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://ads.stickyadstv.com/firefox-etpfirefox.exe, 0000000E.00000003.2258097011.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2264240758.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298762695.000001CC08DF2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2262108196.000001CC08D9D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2234745197.000001CC09EC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2299770378.000001CC08D2D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://identity.mozilla.com/ids/ecosystem_telemetryUfirefox.exe, 0000000E.00000003.2227733616.000001CC13925000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://monitor.firefox.com/breach-details/firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://xhr.spec.whatwg.org/#sync-warningfirefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2120672678.000001CC09C9D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://www.msn.comfirefox.exe, 0000000E.00000003.2233059790.000001CC0B6C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000E.00000003.2075675303.000001CC08253000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075536439.000001CC08238000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075192905.000001CC08000000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075813492.000001CC0826F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2075383083.000001CC0821D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          http://exslt.org/setsfirefox.exe, 0000000E.00000003.2107245932.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267506258.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://youtube.com/firefox.exe, 0000000E.00000003.2231141872.000001CC0B880000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              https://content-signature-2.cdn.mozilla.net/firefox.exe, 0000000E.00000003.2296102895.000001CC10277000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                https://json-schema.org/draft/2020-12/schema/=firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://api.accounts.firefox.com/v1firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  http://exslt.org/commonfirefox.exe, 0000000E.00000003.2107245932.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2267506258.000001CC7ED26000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    https://ok.ru/firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://www.amazon.com/firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullScfirefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://win.mail.ru/cgi-bin/sentmsg?mailto=%sfirefox.exe, 0000000E.00000003.2084793048.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2209787908.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132184372.000001CC07ECA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2082423562.000001CC07EDF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              https://www.youtube.com/firefox.exe, 00000012.00000002.3900090065.000001F81360C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://youtube.com/account?=htt==file.exe, 00000000.00000003.2093042238.000000000155F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2093823249.000000000155F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2094165248.000000000155F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2095704140.000000000155F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    unknown
                                                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    https://www.bbc.co.uk/firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      unknown
                                                                                                                      https://addons.mozilla.org/firefox/addon/to-google-translate/firefox.exe, 0000000E.00000003.2259752422.000001CC09A17000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        unknown
                                                                                                                        https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 00000012.00000002.3900090065.000001F8136C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        http://127.0.0.1:firefox.exe, 0000000E.00000003.2291081260.000001CC0FC98000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                          unknown
                                                                                                                          https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152firefox.exe, 0000000E.00000003.2118808417.000001CC09999000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://mitmdetection.services.mozilla.com/firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://static.adsafeprotected.com/firefox-etp-jsfirefox.exe, 0000000E.00000003.2262108196.000001CC08D52000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2298762695.000001CC08D52000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://youtube.com/account?=recovery.jsonlz4.tmp.14.drfalse
                                                                                                                            unknown
                                                                                                                            https://shavar.services.mozilla.com/firefox.exe, 0000000E.00000003.2260111681.000001CC09785000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              unknown
                                                                                                                              https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBLfirefox.exe, 0000000E.00000003.2227287794.000001CC139B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              • URL Reputation: safe
                                                                                                                              unknown
                                                                                                                              https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&reffirefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drfalse
                                                                                                                              • URL Reputation: safe
                                                                                                                              unknown
                                                                                                                              https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477firefox.exe, 0000000E.00000003.2107245932.000001CC7EDAD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3900138282.000001502E2E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E97F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3902537599.000001F813903000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.14.drfalse
                                                                                                                                unknown
                                                                                                                                https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapturefirefox.exe, 0000000E.00000003.2224328554.000001CC14258000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2300618628.000001CC14258000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  unknown
                                                                                                                                  https://spocs.getpocket.com/firefox.exe, 0000000E.00000003.2259296026.000001CC09A50000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3899885771.00000218E9712000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000012.00000002.3900090065.000001F813613000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  • URL Reputation: safe
                                                                                                                                  unknown
                                                                                                                                  https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                  • URL Reputation: safe
                                                                                                                                  unknown
                                                                                                                                  https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                  • URL Reputation: safe
                                                                                                                                  unknown
                                                                                                                                  https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                  • URL Reputation: safe
                                                                                                                                  unknown
                                                                                                                                  https://www.iqiyi.com/firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    unknown
                                                                                                                                    https://youtube.com/account?=https://accounts.google.cofirefox.exe, 00000012.00000002.3902165408.000001F8137D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      unknown
                                                                                                                                      https://support.mozilla.org/products/firefoxgro.allizom.troppus.places.sqlite-wal.14.drfalse
                                                                                                                                        unknown
                                                                                                                                        https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                          unknown
                                                                                                                                          https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                          • URL Reputation: safe
                                                                                                                                          unknown
                                                                                                                                          https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                          • URL Reputation: safe
                                                                                                                                          unknown
                                                                                                                                          https://addons.mozilla.org/firefox.exe, 0000000E.00000003.2246468047.000001CC134F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                            unknown
                                                                                                                                            http://a9.com/-/spec/opensearch/1.0/firefox.exe, 0000000E.00000003.2262108196.000001CC08D4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                              unknown
                                                                                                                                              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiprefs-1.js.14.drfalse
                                                                                                                                                unknown
                                                                                                                                                https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://monitor.firefox.com/user/dashboardfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://monitor.firefox.com/aboutfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                http://mozilla.org/MPL/2.0/.firefox.exe, 0000000E.00000003.2231141872.000001CC0B8FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2118808417.000001CC09999000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2312787148.000001CC085FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2192361095.000001CC09896000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2101400198.000001CC0A99C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2084081402.000001CC0857A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2186838044.000001CC07DFC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2250850623.000001CC09989000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2189523178.000001CC09D3B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2107245932.000001CC7ED8A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2250436949.000001CC09C4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2232455406.000001CC0B833000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2304804466.000001CC0B8FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2180253662.000001CC085F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2083680897.000001CC085F8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2180253662.000001CC085C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2085609798.000001CC085C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2117452497.000001CC0998D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2083590188.000001CC0924E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2271552219.000001CC0B8FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2083448115.000001CC085FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                  unknown
                                                                                                                                                  https://account.bellmedia.cfirefox.exe, 0000000E.00000003.2233059790.000001CC0B6C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                  • URL Reputation: safe
                                                                                                                                                  unknown
                                                                                                                                                  https://www.openh264.org/firefox.exe, 0000000E.00000003.2221841533.000001CC7EEBE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                    unknown
                                                                                                                                                    http://youtube.com/firefox.exe, 0000000E.00000003.2244880361.000001CC103BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      unknown
                                                                                                                                                      https://login.microsoftonline.comfirefox.exe, 0000000E.00000003.2233059790.000001CC0B6C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      • URL Reputation: safe
                                                                                                                                                      unknown
                                                                                                                                                      https://coverage.mozilla.orgfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                      • URL Reputation: safe
                                                                                                                                                      unknown
                                                                                                                                                      http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.14.drfalse
                                                                                                                                                      • URL Reputation: safe
                                                                                                                                                      unknown
                                                                                                                                                      https://contile.services.mozilla.com/0firefox.exe, 0000000E.00000003.2252893340.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2270550989.000001CC0FFA1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2229159072.000001CC0FF87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        unknown
                                                                                                                                                        https://www.zhihu.com/firefox.exe, 0000000E.00000003.2273283600.000001CC0A4C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2100867555.000001CC10276000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                        unknown
                                                                                                                                                        http://x1.c.lencr.org/0firefox.exe, 0000000E.00000003.2228346100.000001CC10467000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230122571.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                        unknown
                                                                                                                                                        http://x1.i.lencr.org/0firefox.exe, 0000000E.00000003.2228346100.000001CC10467000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2230122571.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109178514.000001CC0FDED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                        unknown
                                                                                                                                                        http://a9.com/-/spec/opensearch/1.1/firefox.exe, 0000000E.00000003.2262108196.000001CC08D4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                        unknown
                                                                                                                                                        https://blocked.cdn.mozilla.net/firefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                        • URL Reputation: safe
                                                                                                                                                        unknown
                                                                                                                                                        https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnoredfirefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                          unknown
                                                                                                                                                          https://json-schema.org/draft/2019-09/schemafirefox.exe, 0000000E.00000003.2304380560.000001CC102A1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2108594997.000001CC102AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2245363374.000001CC10297000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2257547424.000001CC10298000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2100644587.000001CC102AA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2109896894.000001CC08E67000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                          • URL Reputation: safe
                                                                                                                                                          unknown
                                                                                                                                                          http://developer.mozilla.org/en/docs/DOM:element.addEventListenerfirefox.exe, 0000000E.00000003.2230122571.000001CC0FDC9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                            unknown
                                                                                                                                                            https://duckduckgo.com/?t=ffab&q=firefox.exe, 0000000E.00000003.2245363374.000001CC10277000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                              unknown
                                                                                                                                                              https://profiler.firefox.comfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                              • URL Reputation: safe
                                                                                                                                                              unknown
                                                                                                                                                              https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000E.00000003.2186838044.000001CC07D70000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2249476814.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307404878.000001CC07D7F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                              • URL Reputation: safe
                                                                                                                                                              unknown
                                                                                                                                                              https://identity.mozilla.com/apps/relayfirefox.exe, 0000000E.00000003.2255193837.000001CC09AC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2307152473.000001CC09ACF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                unknown
                                                                                                                                                                https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 00000010.00000002.3899889330.000001502E090000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3899283357.00000218E95A0000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000012.00000002.3899830906.000001F813430000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                • URL Reputation: safe
                                                                                                                                                                unknown
                                                                                                                                                                https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000E.00000003.2102004659.000001CC0A8C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2297131286.000001CC0A8C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                • URL Reputation: safe
                                                                                                                                                                unknown
                                                                                                                                                                https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 0000000E.00000003.2131950442.000001CC08C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132592386.000001CC08C56000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2127488768.000001CC08C49000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000E.00000003.2132668557.000001CC08C6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                • URL Reputation: safe
                                                                                                                                                                unknown
                                                                                                                                                                • No. of IPs < 25%
                                                                                                                                                                • 25% < No. of IPs < 50%
                                                                                                                                                                • 50% < No. of IPs < 75%
                                                                                                                                                                • 75% < No. of IPs
                                                                                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                34.149.100.209
                                                                                                                                                                prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                2686ATGS-MMD-ASUSfalse
                                                                                                                                                                34.107.243.93
                                                                                                                                                                push.services.mozilla.comUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                34.107.221.82
                                                                                                                                                                prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                142.250.81.238
                                                                                                                                                                unknownUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                35.244.181.201
                                                                                                                                                                prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                34.117.188.166
                                                                                                                                                                contile.services.mozilla.comUnited States
                                                                                                                                                                139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                                                                52.222.236.23
                                                                                                                                                                services.addons.mozilla.orgUnited States
                                                                                                                                                                16509AMAZON-02USfalse
                                                                                                                                                                35.201.103.21
                                                                                                                                                                normandy-cdn.services.mozilla.comUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                35.190.72.216
                                                                                                                                                                prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                34.160.144.191
                                                                                                                                                                prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                2686ATGS-MMD-ASUSfalse
                                                                                                                                                                34.120.208.123
                                                                                                                                                                telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                                IP
                                                                                                                                                                127.0.0.1
                                                                                                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                Analysis ID:1530781
                                                                                                                                                                Start date and time:2024-10-10 14:41:46 +02:00
                                                                                                                                                                Joe Sandbox product:CloudBasic
                                                                                                                                                                Overall analysis duration:0h 7m 53s
                                                                                                                                                                Hypervisor based Inspection enabled:false
                                                                                                                                                                Report type:full
                                                                                                                                                                Cookbook file name:default.jbs
                                                                                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                Run name:Run with higher sleep bypass
                                                                                                                                                                Number of analysed new started processes analysed:22
                                                                                                                                                                Number of new started drivers analysed:0
                                                                                                                                                                Number of existing processes analysed:0
                                                                                                                                                                Number of existing drivers analysed:0
                                                                                                                                                                Number of injected processes analysed:0
                                                                                                                                                                Technologies:
                                                                                                                                                                • HCA enabled
                                                                                                                                                                • EGA enabled
                                                                                                                                                                • AMSI enabled
                                                                                                                                                                Analysis Mode:default
                                                                                                                                                                Analysis stop reason:Timeout
                                                                                                                                                                Sample name:file.exe
                                                                                                                                                                Detection:MAL
                                                                                                                                                                Classification:mal72.troj.evad.winEXE@34/41@73/12
                                                                                                                                                                EGA Information:
                                                                                                                                                                • Successful, ratio: 50%
                                                                                                                                                                HCA Information:
                                                                                                                                                                • Successful, ratio: 95%
                                                                                                                                                                • Number of executed functions: 40
                                                                                                                                                                • Number of non-executed functions: 313
                                                                                                                                                                Cookbook Comments:
                                                                                                                                                                • Found application associated with file extension: .exe
                                                                                                                                                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                                                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                                                                                                                • Excluded IPs from analysis (whitelisted): 44.242.27.108, 44.224.63.42, 44.238.148.23, 23.60.203.209, 2.22.61.56, 2.22.61.59, 142.250.186.142, 142.250.185.78, 142.250.185.138, 142.250.185.74
                                                                                                                                                                • Excluded domains from analysis (whitelisted): shavar.prod.mozaws.net, fs.microsoft.com, ciscobinary.openh264.org, slscr.update.microsoft.com, otelrules.azureedge.net, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, e16604.g.akamaiedge.net, safebrowsing.googleapis.com, prod.fs.microsoft.com.akadns.net, location.services.mozilla.com
                                                                                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                                                • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                                                                • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                                                                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                                                • VT rate limit hit for: file.exe
                                                                                                                                                                No simulations
                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                34.117.188.166file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                  52.222.236.23file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                    34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                      34.160.144.191file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                        services.addons.mozilla.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.80
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.48
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.48
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.80
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.120
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.80
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.48
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.80
                                                                                                                                                                                                                                        example.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 93.184.215.14
                                                                                                                                                                                                                                        star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.0.35
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.253.35
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.0.35
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.253.35
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.0.35
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.253.35
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.252.35
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.253.35
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 157.240.253.35
                                                                                                                                                                                                                                        twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.1
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.193
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.193
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.65
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.65
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.193
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.1
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.65
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 104.244.42.65
                                                                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                        GOOGLE-AS-APGoogleAsiaPacificPteLtdSGSecuriteInfo.com.Trojan-Ransom.Win32.Zerber.gkca.4990.15640.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                        • 34.117.59.81
                                                                                                                                                                                                                                        SecuriteInfo.com.Trojan-Ransom.Win32.Zerber.gkca.4990.15640.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                        • 34.117.59.81
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.117.188.166
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.117.188.166
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.117.188.166
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.117.188.166
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.117.188.166
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.117.188.166
                                                                                                                                                                                                                                        https://loadfile.komanda.cl/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                        • 34.117.59.81
                                                                                                                                                                                                                                        ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        na.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                        • 56.134.106.66
                                                                                                                                                                                                                                        na.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                        • 56.100.72.207
                                                                                                                                                                                                                                        na.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                        • 56.100.72.207
                                                                                                                                                                                                                                        ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        na.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                        • 56.134.106.66
                                                                                                                                                                                                                                        na.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                        • 56.100.72.207
                                                                                                                                                                                                                                        na.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                        • 56.100.72.207
                                                                                                                                                                                                                                        AMAZON-02USlByv6mqTCJ.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                                                        • 13.248.169.48
                                                                                                                                                                                                                                        3wgZ0nlbTe.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                                                        • 13.248.169.48
                                                                                                                                                                                                                                        6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                                        • 52.217.171.225
                                                                                                                                                                                                                                        nowe zam#U00f3wienie zakupu pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                                                        • 13.248.252.114
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.80
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.48
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        J5kZynz7Ju.exeGet hashmaliciousCobaltStrike, ReflectiveLoaderBrowse
                                                                                                                                                                                                                                        • 52.219.84.114
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 52.222.236.48
                                                                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                        fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        • 35.244.181.201
                                                                                                                                                                                                                                        • 52.222.236.23
                                                                                                                                                                                                                                        • 34.149.100.209
                                                                                                                                                                                                                                        • 34.160.144.191
                                                                                                                                                                                                                                        • 34.120.208.123
                                                                                                                                                                                                                                        • 142.250.81.238
                                                                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                        C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                          C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):7813
                                                                                                                                                                                                                                                                            Entropy (8bit):5.174069892336493
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:192:EKMXjfocbhbVbTbfbRbObtbyEl7npN88JA6wnSrDtTkd/SH:EPkcNhnzFSJJNYjnSrDhkd/O
                                                                                                                                                                                                                                                                            MD5:441F2097048523C4C137F63F4BDD8EE4
                                                                                                                                                                                                                                                                            SHA1:DD29C184BA69C37B72E62D449197B0B4AB1C5848
                                                                                                                                                                                                                                                                            SHA-256:9F6272DDE0E3721425C1C31980CFB4EB086B9C9088BF2DC43266E567ECD81E84
                                                                                                                                                                                                                                                                            SHA-512:5E5D1F12C099B9A5418BEBCEF9A70FDBEB603FDC9F5426F4DDB3CB295FC30B559DF3C71C2A9038062BA178C413DC18628B4918CAC5C9F57C8846DEFF984CE958
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"type":"uninstall","id":"c102ed79-35db-40b8-bc3e-aaa4cb2526e9","creationDate":"2024-10-10T14:09:50.498Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"1fca7bd2-7b44-4c45-b0ea-e0486850ce95","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):7813
                                                                                                                                                                                                                                                                            Entropy (8bit):5.174069892336493
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:192:EKMXjfocbhbVbTbfbRbObtbyEl7npN88JA6wnSrDtTkd/SH:EPkcNhnzFSJJNYjnSrDhkd/O
                                                                                                                                                                                                                                                                            MD5:441F2097048523C4C137F63F4BDD8EE4
                                                                                                                                                                                                                                                                            SHA1:DD29C184BA69C37B72E62D449197B0B4AB1C5848
                                                                                                                                                                                                                                                                            SHA-256:9F6272DDE0E3721425C1C31980CFB4EB086B9C9088BF2DC43266E567ECD81E84
                                                                                                                                                                                                                                                                            SHA-512:5E5D1F12C099B9A5418BEBCEF9A70FDBEB603FDC9F5426F4DDB3CB295FC30B559DF3C71C2A9038062BA178C413DC18628B4918CAC5C9F57C8846DEFF984CE958
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"type":"uninstall","id":"c102ed79-35db-40b8-bc3e-aaa4cb2526e9","creationDate":"2024-10-10T14:09:50.498Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"1fca7bd2-7b44-4c45-b0ea-e0486850ce95","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):490
                                                                                                                                                                                                                                                                            Entropy (8bit):7.246483341090937
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:12:l8v/7J2T+gwjz+vdzLSMO9mj253UT3BcHXhJo:82CgwS//O91iT3BUXh6
                                                                                                                                                                                                                                                                            MD5:BD9751DFFFEFFA2154CC5913489ED58C
                                                                                                                                                                                                                                                                            SHA1:1C9230053C45CA44883103A6ACFDF49AC53ABF45
                                                                                                                                                                                                                                                                            SHA-256:834C4F18E96CFDAA395246183DE76032F1B77886764CEEBE52F6A146FA4D4C3B
                                                                                                                                                                                                                                                                            SHA-512:01072F60F4B2489BB84639A6179A82A3EA90A31C1AD61D30EF27800C3114DB5E45662583E1C0B5382F51635DC14372EFC71DCD069999D6B21A5D256C70697790
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:.......................PNG........IHDR................a....IDAT8O...1P......p....d1.....v)......p.nXM.t.H.(.......B$..}_G.{.......:uN...=......s|.$...`0.....dl6.>>>p.\.v;z.......F.a:.2..D.V.....V..n...g.z.X..C...v.......=.H..d..P*...i.."...X,.B...h...xyy.V....I$..J%r....6....Z-:...P..J..........|>'...P.\&.....l6....N5...Z.x<.....h.z..'@...L&.F..'.Jq<...m6.OOO.....$..r:.......v..V..ze.\.p.R..t.Z.....r...B...3.B..0...T*E".p8.D0..`2.D.j...h..n...wF...........#......O....IEND.B`.
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):32768
                                                                                                                                                                                                                                                                            Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                                                                            MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                                                                            SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                                                                            SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                                                                            SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):453023
                                                                                                                                                                                                                                                                            Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                                                                                            SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                                                                            MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                                                                            SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                                                                            SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                                                                            SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):5488
                                                                                                                                                                                                                                                                            Entropy (8bit):3.3009109966440024
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:48:TwdOrdUgdwg8zZwdOrj6BdwgsfwdOrDadwgu1:xujVDr
                                                                                                                                                                                                                                                                            MD5:21A3FA1289DFE76AE2EEAC1BBA3DE480
                                                                                                                                                                                                                                                                            SHA1:09F6EDD4139BE7BD4D524453FA597C84EDCCF95E
                                                                                                                                                                                                                                                                            SHA-256:2172348AD1CAE438B9DA186800D4349E7658CAA030615FE54D5FACCC0F51439F
                                                                                                                                                                                                                                                                            SHA-512:E7188C694AB08361BF59D45D5E24284C6FB4C29FA2706E45C9AC93B7D2559ACDF72DA0E814BE8D051D69ED9769C33C99436A1BF485DD1DB0AAD8423E7F7AEE1A
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:...................................FL..................F.@.. ...p......................S...........................P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IJYTe....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}WJYTe............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}WJYTe..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z............C>......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):5488
                                                                                                                                                                                                                                                                            Entropy (8bit):3.3009109966440024
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:48:TwdOrdUgdwg8zZwdOrj6BdwgsfwdOrDadwgu1:xujVDr
                                                                                                                                                                                                                                                                            MD5:21A3FA1289DFE76AE2EEAC1BBA3DE480
                                                                                                                                                                                                                                                                            SHA1:09F6EDD4139BE7BD4D524453FA597C84EDCCF95E
                                                                                                                                                                                                                                                                            SHA-256:2172348AD1CAE438B9DA186800D4349E7658CAA030615FE54D5FACCC0F51439F
                                                                                                                                                                                                                                                                            SHA-512:E7188C694AB08361BF59D45D5E24284C6FB4C29FA2706E45C9AC93B7D2559ACDF72DA0E814BE8D051D69ED9769C33C99436A1BF485DD1DB0AAD8423E7F7AEE1A
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:...................................FL..................F.@.. ...p......................S...........................P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IJYTe....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}WJYTe............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}WJYTe..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z............C>......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):5488
                                                                                                                                                                                                                                                                            Entropy (8bit):3.3009109966440024
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:48:TwdOrdUgdwg8zZwdOrj6BdwgsfwdOrDadwgu1:xujVDr
                                                                                                                                                                                                                                                                            MD5:21A3FA1289DFE76AE2EEAC1BBA3DE480
                                                                                                                                                                                                                                                                            SHA1:09F6EDD4139BE7BD4D524453FA597C84EDCCF95E
                                                                                                                                                                                                                                                                            SHA-256:2172348AD1CAE438B9DA186800D4349E7658CAA030615FE54D5FACCC0F51439F
                                                                                                                                                                                                                                                                            SHA-512:E7188C694AB08361BF59D45D5E24284C6FB4C29FA2706E45C9AC93B7D2559ACDF72DA0E814BE8D051D69ED9769C33C99436A1BF485DD1DB0AAD8423E7F7AEE1A
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:...................................FL..................F.@.. ...p......................S...........................P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IJYTe....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}WJYTe............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}WJYTe..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z............C>......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):5488
                                                                                                                                                                                                                                                                            Entropy (8bit):3.3009109966440024
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:48:TwdOrdUgdwg8zZwdOrj6BdwgsfwdOrDadwgu1:xujVDr
                                                                                                                                                                                                                                                                            MD5:21A3FA1289DFE76AE2EEAC1BBA3DE480
                                                                                                                                                                                                                                                                            SHA1:09F6EDD4139BE7BD4D524453FA597C84EDCCF95E
                                                                                                                                                                                                                                                                            SHA-256:2172348AD1CAE438B9DA186800D4349E7658CAA030615FE54D5FACCC0F51439F
                                                                                                                                                                                                                                                                            SHA-512:E7188C694AB08361BF59D45D5E24284C6FB4C29FA2706E45C9AC93B7D2559ACDF72DA0E814BE8D051D69ED9769C33C99436A1BF485DD1DB0AAD8423E7F7AEE1A
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:...................................FL..................F.@.. ...p......................S...........................P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IJYTe....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}WJYTe............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}WJYTe..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z............C>......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):3621
                                                                                                                                                                                                                                                                            Entropy (8bit):4.9222342769749545
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:48:YnSwkmrOVPUFRbOdwNIOdoWLEWLtkDZuwpx5FBvipA6kb92the6LuhakNf9cpxeh:8S+OVPUFRbOdwNIOdYpjvY1Q6Lcup8P
                                                                                                                                                                                                                                                                            MD5:D7F4745ED0E8FA7D9949DCB4B8EDA855
                                                                                                                                                                                                                                                                            SHA1:3C9DF76FE45C927ED1E2734414F665E7D5510402
                                                                                                                                                                                                                                                                            SHA-256:75317092693528576376C95D0523029CC2AB7FD95044D383F06C729BF1BA812E
                                                                                                                                                                                                                                                                            SHA-512:66CF6E9D422936B78AE31BE206EFEDE1E6B471C2590EF91EFF3197EDE6A1D9EDA68CBBD0C27CB3712AD3A1978E0414D1F6F7AE9C3C62E47DC8B5CED9319A78DD
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"3ba649bc-be47-4b92-8762-21cab57bda3b","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-04T13:40:33.697Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):3621
                                                                                                                                                                                                                                                                            Entropy (8bit):4.9222342769749545
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:48:YnSwkmrOVPUFRbOdwNIOdoWLEWLtkDZuwpx5FBvipA6kb92the6LuhakNf9cpxeh:8S+OVPUFRbOdwNIOdYpjvY1Q6Lcup8P
                                                                                                                                                                                                                                                                            MD5:D7F4745ED0E8FA7D9949DCB4B8EDA855
                                                                                                                                                                                                                                                                            SHA1:3C9DF76FE45C927ED1E2734414F665E7D5510402
                                                                                                                                                                                                                                                                            SHA-256:75317092693528576376C95D0523029CC2AB7FD95044D383F06C729BF1BA812E
                                                                                                                                                                                                                                                                            SHA-512:66CF6E9D422936B78AE31BE206EFEDE1E6B471C2590EF91EFF3197EDE6A1D9EDA68CBBD0C27CB3712AD3A1978E0414D1F6F7AE9C3C62E47DC8B5CED9319A78DD
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"3ba649bc-be47-4b92-8762-21cab57bda3b","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-04T13:40:33.697Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:Mozilla lz4 compressed data, originally 22422 bytes
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):5308
                                                                                                                                                                                                                                                                            Entropy (8bit):6.599374203470186
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:96:z2YbKsKNU2xWrp327tGmD4wBON6h6cHAHJVauvjZHjkTymdS1/qTMg6Uhm:zTx2x2t0FDJ4NpkuvjdeplTMohm
                                                                                                                                                                                                                                                                            MD5:EB56C2F4DA9435F3D5574161F414CD17
                                                                                                                                                                                                                                                                            SHA1:74A8FC3EC0559740FD9D835B638354985E2DEAB6
                                                                                                                                                                                                                                                                            SHA-256:394E803D5FF8E156DFA7D15E96B51A683F4624A1BCF88EAA532399AC2C9B0966
                                                                                                                                                                                                                                                                            SHA-512:DF90568D191C757392FB85BDDA5333C7FE7E3BB370C5DE8C50DD810B938D732E39B5608FB4494CAADAE99E1601989FDFC0FEBDCF70F27FFE581F904170A81E0F
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:mozLz40..W....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:Mozilla lz4 compressed data, originally 22422 bytes
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):5308
                                                                                                                                                                                                                                                                            Entropy (8bit):6.599374203470186
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:96:z2YbKsKNU2xWrp327tGmD4wBON6h6cHAHJVauvjZHjkTymdS1/qTMg6Uhm:zTx2x2t0FDJ4NpkuvjdeplTMohm
                                                                                                                                                                                                                                                                            MD5:EB56C2F4DA9435F3D5574161F414CD17
                                                                                                                                                                                                                                                                            SHA1:74A8FC3EC0559740FD9D835B638354985E2DEAB6
                                                                                                                                                                                                                                                                            SHA-256:394E803D5FF8E156DFA7D15E96B51A683F4624A1BCF88EAA532399AC2C9B0966
                                                                                                                                                                                                                                                                            SHA-512:DF90568D191C757392FB85BDDA5333C7FE7E3BB370C5DE8C50DD810B938D732E39B5608FB4494CAADAE99E1601989FDFC0FEBDCF70F27FFE581F904170A81E0F
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:mozLz40..W....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):24
                                                                                                                                                                                                                                                                            Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                                            MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                                            SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                                            SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                                            SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):24
                                                                                                                                                                                                                                                                            Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                                            MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                                            SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                                            SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                                            SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):262144
                                                                                                                                                                                                                                                                            Entropy (8bit):0.04905141882491872
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:24:DLSvwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:DKwae+QtMImelekKDa5
                                                                                                                                                                                                                                                                            MD5:8736A542C5564A922C47B19D9CC5E0F2
                                                                                                                                                                                                                                                                            SHA1:CE9D58967DA9B5356D6C1D8A482F9CE74DA9097A
                                                                                                                                                                                                                                                                            SHA-256:97CE5D8AFBB0AA610219C4FAC3927E32C91BFFD9FD971AF68C718E7B27E40077
                                                                                                                                                                                                                                                                            SHA-512:99777325893DC7A95FD49B2DA18D32D65F97CC7A8E482D78EDC32F63245457FA5A52750800C074D552D20B6A215604161FDC88763D93C76A8703470C3064196B
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):66
                                                                                                                                                                                                                                                                            Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                                            MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                                            SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                                            SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                                            SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):66
                                                                                                                                                                                                                                                                            Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                                            MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                                            SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                                            SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                                            SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):36830
                                                                                                                                                                                                                                                                            Entropy (8bit):5.1867463390487
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:768:JI4avfWX94O6L4x4ME454N4ohvM4T4Pia4T4I4t54U:JI4KvG
                                                                                                                                                                                                                                                                            MD5:98875950B62B398FFE70C0A8D0998017
                                                                                                                                                                                                                                                                            SHA1:CFCFFF938402E53D341FE392E25D2E6C557E548F
                                                                                                                                                                                                                                                                            SHA-256:1B445C7E12712026D4E663426527CE58FD221D2E26545AEA699E67D60F16E7F0
                                                                                                                                                                                                                                                                            SHA-512:728FF6FF915A45B44D720F41F9545F41F1BF5FB218D58073BD27DB19145D2225488988BE80FB0F712922D7B661E1A64448E3F71F09A1480B6F20BD2480888ABF
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{7a5650ac-9a89-4807-a040-9f0832bf39a9}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):36830
                                                                                                                                                                                                                                                                            Entropy (8bit):5.1867463390487
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:768:JI4avfWX94O6L4x4ME454N4ohvM4T4Pia4T4I4t54U:JI4KvG
                                                                                                                                                                                                                                                                            MD5:98875950B62B398FFE70C0A8D0998017
                                                                                                                                                                                                                                                                            SHA1:CFCFFF938402E53D341FE392E25D2E6C557E548F
                                                                                                                                                                                                                                                                            SHA-256:1B445C7E12712026D4E663426527CE58FD221D2E26545AEA699E67D60F16E7F0
                                                                                                                                                                                                                                                                            SHA-512:728FF6FF915A45B44D720F41F9545F41F1BF5FB218D58073BD27DB19145D2225488988BE80FB0F712922D7B661E1A64448E3F71F09A1480B6F20BD2480888ABF
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{7a5650ac-9a89-4807-a040-9f0832bf39a9}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):32768
                                                                                                                                                                                                                                                                            Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                                                                            MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                                                                            SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                                                                            SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                                                                            SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):1021904
                                                                                                                                                                                                                                                                            Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                                            MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                                            SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                                            SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                                            SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                                            Joe Sandbox View:
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):1021904
                                                                                                                                                                                                                                                                            Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                                            MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                                            SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                                            SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                                            SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                                            Joe Sandbox View:
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:ASCII text
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):116
                                                                                                                                                                                                                                                                            Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                                            MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                                            SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                                            SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                                            SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:ASCII text
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):116
                                                                                                                                                                                                                                                                            Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                                            MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                                            SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                                            SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                                            SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):98304
                                                                                                                                                                                                                                                                            Entropy (8bit):0.07328276726911127
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zkimi:DLhesh7Owd4+ji
                                                                                                                                                                                                                                                                            MD5:038C199DB7BEA8E9683E46893C607EA5
                                                                                                                                                                                                                                                                            SHA1:FDEBE083DBEBEFE629D8136C59341F618A1189BB
                                                                                                                                                                                                                                                                            SHA-256:DE84CFEE914BDABBD6E10E59BBA6412EB095B954B7E5FEFA302AF9D332777D4F
                                                                                                                                                                                                                                                                            SHA-512:176FA9E5D4661D7B1A47BCD8ACAE90E2E771F20F40883C9C80DAEE0000D158B814714FDE7BC0B2D03DFC86EB3CE93B6FA38E52212122ED23633702FD84B265A6
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):32768
                                                                                                                                                                                                                                                                            Entropy (8bit):0.039629310946426154
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:GHlhV4YtfMYdaSY/HlhV4YtfMYdaYtil8a9//Ylll4llqlyllel4lt:G7V4ohdE7V4ohdKL9XIwlio
                                                                                                                                                                                                                                                                            MD5:FF8F143D3ED0535D53DA6237F3AB6714
                                                                                                                                                                                                                                                                            SHA1:375225736B40D2692BE10B936AEFCF2B6498CD33
                                                                                                                                                                                                                                                                            SHA-256:7F7AEFE40252A9596588AA168FF7D4FAA92D87346CB28C4F6B1974AEFAF9B462
                                                                                                                                                                                                                                                                            SHA-512:439AEB52B92645B650DA63CCA61D4B8327122782535D626FAF0C74D04C3B503C8FD0A353B4AA88C159F309D15552E10DA1A9C62E76F4F0E7D47B10C4FCF571CE
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:..-......................o[..A..........*..I...-......................o[..A..........*..I.........................................................'...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):163992
                                                                                                                                                                                                                                                                            Entropy (8bit):0.13388298754145606
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:24:KQ1FTQfkUFLxsZ+bR2zxsMlCXsMzqCFZ7pCF6C5WUCuSCCQE/HaaKCc7RCGOxsaA:bQMiQc2VJCXs4qLWeJa1VyPF0FZk
                                                                                                                                                                                                                                                                            MD5:EB38185C24DB5665D90980D076480A49
                                                                                                                                                                                                                                                                            SHA1:3DA5BC10077F01668CC043522D7A876717343A4A
                                                                                                                                                                                                                                                                            SHA-256:BCEC9A6A8571636C508E7D1B1178B3A3978499DAF0112B196D19B1E0B5C9EE2D
                                                                                                                                                                                                                                                                            SHA-512:D3163B4EC2EC1CB2C8236D677FA9481D2BD3977661CE64505C7413E41818407099EC3874279790D58B46060AA427AF0BC1871CEC4FE2C2D048818B6D18B55C1E
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:7....-.................Q..$.Z.....................;.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:ASCII text, with very long lines (1743), with CRLF line terminators
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):13187
                                                                                                                                                                                                                                                                            Entropy (8bit):5.477993874327486
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:192:UnPOeRnLYbBp6LJ0aX+q6SEXKbXNMn5RHWNBw8diSl:2DemJUxu9yHEw10
                                                                                                                                                                                                                                                                            MD5:2290C6C95CD7CD14E1467BB9C57FAFD6
                                                                                                                                                                                                                                                                            SHA1:AD48BB5C46372F327716022294F389FA9717A5D3
                                                                                                                                                                                                                                                                            SHA-256:8DCB85C66C0B80535A8DB4B1F385B6A9C71999395872FC684E27F4EAC83E69BB
                                                                                                                                                                                                                                                                            SHA-512:CBB29FF95F0A3A7B3CB53ACA059C37A1FC4ADF330BD8C982431AD72C6C10A5084CEB598BBC688367748C79F408FFDDE38F85D095CEC84050A92DCD9719641A49
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "9e34c6e7-cbed-40a0-ba63-35488e171013");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1728569361);..user_pref("app.update.lastUpdateTime.background-update-timer", 1728569361);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1728569361);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 172856
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:ASCII text, with very long lines (1743), with CRLF line terminators
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):13187
                                                                                                                                                                                                                                                                            Entropy (8bit):5.477993874327486
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:192:UnPOeRnLYbBp6LJ0aX+q6SEXKbXNMn5RHWNBw8diSl:2DemJUxu9yHEw10
                                                                                                                                                                                                                                                                            MD5:2290C6C95CD7CD14E1467BB9C57FAFD6
                                                                                                                                                                                                                                                                            SHA1:AD48BB5C46372F327716022294F389FA9717A5D3
                                                                                                                                                                                                                                                                            SHA-256:8DCB85C66C0B80535A8DB4B1F385B6A9C71999395872FC684E27F4EAC83E69BB
                                                                                                                                                                                                                                                                            SHA-512:CBB29FF95F0A3A7B3CB53ACA059C37A1FC4ADF330BD8C982431AD72C6C10A5084CEB598BBC688367748C79F408FFDDE38F85D095CEC84050A92DCD9719641A49
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "9e34c6e7-cbed-40a0-ba63-35488e171013");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1728569361);..user_pref("app.update.lastUpdateTime.background-update-timer", 1728569361);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1728569361);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 172856
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):65536
                                                                                                                                                                                                                                                                            Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:lSGBl/l/zl9l/AltllPltlnKollzvulJOlzALRWemFxu7TuRjBFbrl58lcV+wgn8:ltBl/lqN1K4BEJYqWvLue3FMOrMZ0l
                                                                                                                                                                                                                                                                            MD5:60C09456D6362C6FBED48C69AA342C3C
                                                                                                                                                                                                                                                                            SHA1:58B6E22DAA48C75958B429F662DEC1C011AE74D3
                                                                                                                                                                                                                                                                            SHA-256:FE1A432A2CD096B7EEA870D46D07F5197E34B4D10666E6E1C357FAA3F2FE2389
                                                                                                                                                                                                                                                                            SHA-512:936DBC887276EF07732783B50EAFE450A8598B0492B8F6C838B337EF3E8A6EA595E7C7A2FA4B3E881887FAAE2D207B953A4C65ED8C964D93118E00D3E03882BD
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):493
                                                                                                                                                                                                                                                                            Entropy (8bit):4.94818870896158
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:12:YZFgepgHXnIVHlW8cOlZGV1AQIYzvZcyBuLZGAvxn:YXpGXnSlCOlZGV1AQIWZcy6ZXvx
                                                                                                                                                                                                                                                                            MD5:FC7DEA866C72D277BBBB64EA5170158B
                                                                                                                                                                                                                                                                            SHA1:0A806A7B416148F92C6D6D6176C9876C9FDBF59E
                                                                                                                                                                                                                                                                            SHA-256:32EEB7DDF78EED6E979F838B5856E5A2697FC6E53EB9833D1E416D1979414AAF
                                                                                                                                                                                                                                                                            SHA-512:2BB8535E12342B2AEE19AF147D8018AA99955140262DD3CF4CE730664F49C78C0F4F4BBF018291F34FC5A9E9B4AD775B5F4D667E550C38C20D361BED6C968960
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"type":"health","id":"0a7b22cd-545d-43fe-8156-41d25a6e6da5","creationDate":"2024-10-10T14:09:50.966Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"os":{"name":"WINNT","version":"10.0"},"reason":"immediate","sendFailure":{"eUnreachable":1}},"clientId":"1fca7bd2-7b44-4c45-b0ea-e0486850ce95"}
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:modified
                                                                                                                                                                                                                                                                            Size (bytes):493
                                                                                                                                                                                                                                                                            Entropy (8bit):4.94818870896158
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:12:YZFgepgHXnIVHlW8cOlZGV1AQIYzvZcyBuLZGAvxn:YXpGXnSlCOlZGV1AQIWZcy6ZXvx
                                                                                                                                                                                                                                                                            MD5:FC7DEA866C72D277BBBB64EA5170158B
                                                                                                                                                                                                                                                                            SHA1:0A806A7B416148F92C6D6D6176C9876C9FDBF59E
                                                                                                                                                                                                                                                                            SHA-256:32EEB7DDF78EED6E979F838B5856E5A2697FC6E53EB9833D1E416D1979414AAF
                                                                                                                                                                                                                                                                            SHA-512:2BB8535E12342B2AEE19AF147D8018AA99955140262DD3CF4CE730664F49C78C0F4F4BBF018291F34FC5A9E9B4AD775B5F4D667E550C38C20D361BED6C968960
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"type":"health","id":"0a7b22cd-545d-43fe-8156-41d25a6e6da5","creationDate":"2024-10-10T14:09:50.966Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"os":{"name":"WINNT","version":"10.0"},"reason":"immediate","sendFailure":{"eUnreachable":1}},"clientId":"1fca7bd2-7b44-4c45-b0ea-e0486850ce95"}
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):90
                                                                                                                                                                                                                                                                            Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                                            MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                                            SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                                            SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                                            SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):90
                                                                                                                                                                                                                                                                            Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                                            MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                                            SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                                            SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                                            SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):1567
                                                                                                                                                                                                                                                                            Entropy (8bit):6.347286227501475
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:24:v+USUGlcAxSo7LXnIrh/pnxQwRcWT5sKmgb039U3eHVpjO+8ramhujJwO2c0TiV5:GUpOxZ7+nRcoegQU3erjx8r4Jwc3zBtT
                                                                                                                                                                                                                                                                            MD5:453B149D861922DF7D1783DBC04138EE
                                                                                                                                                                                                                                                                            SHA1:3F5A451C533644C5B29A76E989978DE4EE39F5C5
                                                                                                                                                                                                                                                                            SHA-256:B34F6B923A022DAAFC427A9707D630FF6CE2C4ECE2ED7A1A5A2B5D53EAF20B1D
                                                                                                                                                                                                                                                                            SHA-512:DABC276FBF4D3C7CE22BCAFD1FD7D6BE339DED2A5C00B56679860D8948D8DCD811C8B28DFA67EBBBB4BF8244FA56E9C1B2105D06EC07E396FE78414BA0EB7EB1
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":7,"docshellUU...D"{3b4fb1df-6211-4ff5-8d58-7ef6957fd6f6}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":8,"persistK..+}],"lastAccessed":1728569365408,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2150633470....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...98952893-68ff-4a5d-a164-705c709ed3db","zD..1...Wm..l........j..:....1":{..jUpdate...9,"startTim..P30344...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...'b03116d8508741e1c0453eca6046028f71c7c2b904be5e0a0d4686...b1764f","pa..p"/","na..a"taarI|.Tecure2..C.Donly..fexpiry...35705,"originA...."f
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):1567
                                                                                                                                                                                                                                                                            Entropy (8bit):6.347286227501475
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:24:v+USUGlcAxSo7LXnIrh/pnxQwRcWT5sKmgb039U3eHVpjO+8ramhujJwO2c0TiV5:GUpOxZ7+nRcoegQU3erjx8r4Jwc3zBtT
                                                                                                                                                                                                                                                                            MD5:453B149D861922DF7D1783DBC04138EE
                                                                                                                                                                                                                                                                            SHA1:3F5A451C533644C5B29A76E989978DE4EE39F5C5
                                                                                                                                                                                                                                                                            SHA-256:B34F6B923A022DAAFC427A9707D630FF6CE2C4ECE2ED7A1A5A2B5D53EAF20B1D
                                                                                                                                                                                                                                                                            SHA-512:DABC276FBF4D3C7CE22BCAFD1FD7D6BE339DED2A5C00B56679860D8948D8DCD811C8B28DFA67EBBBB4BF8244FA56E9C1B2105D06EC07E396FE78414BA0EB7EB1
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":7,"docshellUU...D"{3b4fb1df-6211-4ff5-8d58-7ef6957fd6f6}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":8,"persistK..+}],"lastAccessed":1728569365408,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2150633470....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...98952893-68ff-4a5d-a164-705c709ed3db","zD..1...Wm..l........j..:....1":{..jUpdate...9,"startTim..P30344...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...'b03116d8508741e1c0453eca6046028f71c7c2b904be5e0a0d4686...b1764f","pa..p"/","na..a"taarI|.Tecure2..C.Donly..fexpiry...35705,"originA...."f
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):1567
                                                                                                                                                                                                                                                                            Entropy (8bit):6.347286227501475
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:24:v+USUGlcAxSo7LXnIrh/pnxQwRcWT5sKmgb039U3eHVpjO+8ramhujJwO2c0TiV5:GUpOxZ7+nRcoegQU3erjx8r4Jwc3zBtT
                                                                                                                                                                                                                                                                            MD5:453B149D861922DF7D1783DBC04138EE
                                                                                                                                                                                                                                                                            SHA1:3F5A451C533644C5B29A76E989978DE4EE39F5C5
                                                                                                                                                                                                                                                                            SHA-256:B34F6B923A022DAAFC427A9707D630FF6CE2C4ECE2ED7A1A5A2B5D53EAF20B1D
                                                                                                                                                                                                                                                                            SHA-512:DABC276FBF4D3C7CE22BCAFD1FD7D6BE339DED2A5C00B56679860D8948D8DCD811C8B28DFA67EBBBB4BF8244FA56E9C1B2105D06EC07E396FE78414BA0EB7EB1
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":7,"docshellUU...D"{3b4fb1df-6211-4ff5-8d58-7ef6957fd6f6}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":8,"persistK..+}],"lastAccessed":1728569365408,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2150633470....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...98952893-68ff-4a5d-a164-705c709ed3db","zD..1...Wm..l........j..:....1":{..jUpdate...9,"startTim..P30344...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...'b03116d8508741e1c0453eca6046028f71c7c2b904be5e0a0d4686...b1764f","pa..p"/","na..a"taarI|.Tecure2..C.Donly..fexpiry...35705,"originA...."f
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):4096
                                                                                                                                                                                                                                                                            Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                                                                            MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                                                                            SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                                                                            SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                                                                            SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):4537
                                                                                                                                                                                                                                                                            Entropy (8bit):5.028751231755492
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:96:ycNMTEr5/lLmI2Ac1zzcxvbw6Kkgrc2Rn27:oTEr5NX0z3DhRe
                                                                                                                                                                                                                                                                            MD5:03A7D1902777F00A8040942B9236D4EF
                                                                                                                                                                                                                                                                            SHA1:ED116722D805C136B3C8C3FEB8556244F5E7B7B2
                                                                                                                                                                                                                                                                            SHA-256:C78DD7FABF2BB7ADE9FFBB8099DBA232A02FA03FFF3BC45442B463834999E74B
                                                                                                                                                                                                                                                                            SHA-512:D8CA9AEDE829585AB04634361C6DBB1F8ED391FA1F6605AF2D567694E396B9E73F59908E86FB75FA4B3DD36C5CF6C477E6980A1251543DAD772F3BEC2C521EEC
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-10T14:09:05.205Z","profileAgeCreated":1696426830133,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                                            Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                                                                            Size (bytes):4537
                                                                                                                                                                                                                                                                            Entropy (8bit):5.028751231755492
                                                                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                                                                            SSDEEP:96:ycNMTEr5/lLmI2Ac1zzcxvbw6Kkgrc2Rn27:oTEr5NX0z3DhRe
                                                                                                                                                                                                                                                                            MD5:03A7D1902777F00A8040942B9236D4EF
                                                                                                                                                                                                                                                                            SHA1:ED116722D805C136B3C8C3FEB8556244F5E7B7B2
                                                                                                                                                                                                                                                                            SHA-256:C78DD7FABF2BB7ADE9FFBB8099DBA232A02FA03FFF3BC45442B463834999E74B
                                                                                                                                                                                                                                                                            SHA-512:D8CA9AEDE829585AB04634361C6DBB1F8ED391FA1F6605AF2D567694E396B9E73F59908E86FB75FA4B3DD36C5CF6C477E6980A1251543DAD772F3BEC2C521EEC
                                                                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                                                                            Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-10T14:09:05.205Z","profileAgeCreated":1696426830133,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                                            Entropy (8bit):6.5846710403073745
                                                                                                                                                                                                                                                                            TrID:
                                                                                                                                                                                                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                                            File name:file.exe
                                                                                                                                                                                                                                                                            File size:919'552 bytes
                                                                                                                                                                                                                                                                            MD5:73fb1da6c85604b6cd17ac7334ec9aa4
                                                                                                                                                                                                                                                                            SHA1:84901db0a0c7b7b0b1e9ea6d8c95e26b5c89f0a8
                                                                                                                                                                                                                                                                            SHA256:7732b8796639a17e832ef1a3bb9bce24818f87910c70c661d4ff88508b16618c
                                                                                                                                                                                                                                                                            SHA512:4b380503b4f9de9e5d2e0079e949c0f1b4a56497271ffaea4f7962cacb50df6d8b6c67f77402efb4b70222ccf0670a3bc015fb0d91b7cf0f92a22f8ae86737a1
                                                                                                                                                                                                                                                                            SSDEEP:12288:VqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga/TV:VqDEvCTbMWu7rQYlBQcBiT6rprG8abV
                                                                                                                                                                                                                                                                            TLSH:03159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                                                                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                                                                            Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                                                                            Entrypoint:0x420577
                                                                                                                                                                                                                                                                            Entrypoint Section:.text
                                                                                                                                                                                                                                                                            Digitally signed:false
                                                                                                                                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                                                                                                                                            Subsystem:windows gui
                                                                                                                                                                                                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                                                                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                                            Time Stamp:0x6707C775 [Thu Oct 10 12:24:21 2024 UTC]
                                                                                                                                                                                                                                                                            TLS Callbacks:
                                                                                                                                                                                                                                                                            CLR (.Net) Version:
                                                                                                                                                                                                                                                                            OS Version Major:5
                                                                                                                                                                                                                                                                            OS Version Minor:1
                                                                                                                                                                                                                                                                            File Version Major:5
                                                                                                                                                                                                                                                                            File Version Minor:1
                                                                                                                                                                                                                                                                            Subsystem Version Major:5
                                                                                                                                                                                                                                                                            Subsystem Version Minor:1
                                                                                                                                                                                                                                                                            Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                                                                            Instruction
                                                                                                                                                                                                                                                                            call 00007FF768DFD623h
                                                                                                                                                                                                                                                                            jmp 00007FF768DFCF2Fh
                                                                                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                                                                                            mov ebp, esp
                                                                                                                                                                                                                                                                            push esi
                                                                                                                                                                                                                                                                            push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                            mov esi, ecx
                                                                                                                                                                                                                                                                            call 00007FF768DFD10Dh
                                                                                                                                                                                                                                                                            mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                                                                            mov eax, esi
                                                                                                                                                                                                                                                                            pop esi
                                                                                                                                                                                                                                                                            pop ebp
                                                                                                                                                                                                                                                                            retn 0004h
                                                                                                                                                                                                                                                                            and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                                            mov eax, ecx
                                                                                                                                                                                                                                                                            and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                                            mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                                                                            mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                                                                            ret
                                                                                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                                                                                            mov ebp, esp
                                                                                                                                                                                                                                                                            push esi
                                                                                                                                                                                                                                                                            push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                            mov esi, ecx
                                                                                                                                                                                                                                                                            call 00007FF768DFD0DAh
                                                                                                                                                                                                                                                                            mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                                                                            mov eax, esi
                                                                                                                                                                                                                                                                            pop esi
                                                                                                                                                                                                                                                                            pop ebp
                                                                                                                                                                                                                                                                            retn 0004h
                                                                                                                                                                                                                                                                            and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                                            mov eax, ecx
                                                                                                                                                                                                                                                                            and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                                            mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                                                                            mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                                                                            ret
                                                                                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                                                                                            mov ebp, esp
                                                                                                                                                                                                                                                                            push esi
                                                                                                                                                                                                                                                                            mov esi, ecx
                                                                                                                                                                                                                                                                            lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                                            mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                                            and dword ptr [eax], 00000000h
                                                                                                                                                                                                                                                                            and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                                                                            push eax
                                                                                                                                                                                                                                                                            mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                            add eax, 04h
                                                                                                                                                                                                                                                                            push eax
                                                                                                                                                                                                                                                                            call 00007FF768DFFCCDh
                                                                                                                                                                                                                                                                            pop ecx
                                                                                                                                                                                                                                                                            pop ecx
                                                                                                                                                                                                                                                                            mov eax, esi
                                                                                                                                                                                                                                                                            pop esi
                                                                                                                                                                                                                                                                            pop ebp
                                                                                                                                                                                                                                                                            retn 0004h
                                                                                                                                                                                                                                                                            lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                                                                            mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                                                                            push eax
                                                                                                                                                                                                                                                                            call 00007FF768DFFD18h
                                                                                                                                                                                                                                                                            pop ecx
                                                                                                                                                                                                                                                                            ret
                                                                                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                                                                                            mov ebp, esp
                                                                                                                                                                                                                                                                            push esi
                                                                                                                                                                                                                                                                            mov esi, ecx
                                                                                                                                                                                                                                                                            lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                                            mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                                            push eax
                                                                                                                                                                                                                                                                            call 00007FF768DFFD01h
                                                                                                                                                                                                                                                                            test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                                                                            pop ecx
                                                                                                                                                                                                                                                                            Programming Language:
                                                                                                                                                                                                                                                                            • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                                            • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9c28.rsrc
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                                            .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                            .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                            .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                                            .rsrc0xd40000x9c280x9e0081617d7366ce549f9e9c115569898ce4False0.31571400316455694data5.373784108394217IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                            .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                                            RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                                                                            RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                                                                            RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                                                                            RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                                            RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                                                                            RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                                                                            RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                                                                            RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                                                                            RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                                                                            RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                                                                            RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                                                                            RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                                                                            RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                                            RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                                                                            RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                                                                            RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                                                                            RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                                                                            RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                                                                            RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                                                                            RT_RCDATA0xdc7b80xef0data1.0028765690376569
                                                                                                                                                                                                                                                                            RT_GROUP_ICON0xdd6a80x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                                                                            RT_GROUP_ICON0xdd7200x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                                            RT_GROUP_ICON0xdd7340x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                                                                            RT_GROUP_ICON0xdd7480x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                                            RT_VERSION0xdd75c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                                                                            RT_MANIFEST0xdd8380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                                                                            DLLImport
                                                                                                                                                                                                                                                                            WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                                                                            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                                                                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                                                                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                                                                            MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                                                                            WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                                                                            PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                                                                            IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                                                                            USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                                                                            UxTheme.dllIsThemeActive
                                                                                                                                                                                                                                                                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                                                                            USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                                                                            GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                                                                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                                                                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                                                                            SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                                                                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                                                                            OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                                            EnglishGreat Britain
                                                                                                                                                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.957787037 CEST49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.957838058 CEST4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.957973957 CEST49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.962708950 CEST49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.962732077 CEST4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.425983906 CEST4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.426078081 CEST49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.434488058 CEST49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.434509039 CEST4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.434602022 CEST49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.434726954 CEST4434971035.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.438293934 CEST49710443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.899687052 CEST4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.904625893 CEST804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.905103922 CEST4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.905208111 CEST4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.909992933 CEST804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.123297930 CEST49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.123354912 CEST4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.125976086 CEST49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.127331972 CEST49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.127357960 CEST4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.142693996 CEST49715443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.142748117 CEST4434971534.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.143302917 CEST49715443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.144750118 CEST49715443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.144785881 CEST4434971534.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.420598984 CEST804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.464448929 CEST4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.632941961 CEST4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.633949995 CEST49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.638550043 CEST4434971534.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.647414923 CEST4434971534.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.649763107 CEST49715443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.000729084 CEST49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.000809908 CEST4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.000843048 CEST49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.001363039 CEST4434971434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.003097057 CEST49715443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.003115892 CEST4434971534.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.003190994 CEST49715443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.003252983 CEST4434971534.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.004219055 CEST49714443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.005222082 CEST49715443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.273418903 CEST49718443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.273448944 CEST4434971834.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.273510933 CEST49719443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.273554087 CEST4434971935.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.273555040 CEST49718443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.275055885 CEST49719443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.275137901 CEST49718443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.275156975 CEST4434971834.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.275177002 CEST49719443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.275190115 CEST4434971935.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.385776043 CEST49720443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.385813951 CEST4434972034.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.386276007 CEST49720443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.386430025 CEST49720443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.386445045 CEST4434972034.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.386742115 CEST4972180192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.391866922 CEST804972134.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.391925097 CEST4972180192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.469114065 CEST4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.474040031 CEST804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.569230080 CEST804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.621454954 CEST4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.623248100 CEST4972280192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.628128052 CEST804972234.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.630829096 CEST4972280192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.631020069 CEST4972280192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.636555910 CEST804972234.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.850774050 CEST4434971834.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.850879908 CEST49718443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.853280067 CEST4434972034.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.853648901 CEST49720443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.856513023 CEST49720443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.856528997 CEST4434972034.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.856549025 CEST4434971935.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.856664896 CEST49719443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.856827021 CEST4434972034.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.859492064 CEST49719443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.859499931 CEST4434971935.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.859797001 CEST4434971935.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.862850904 CEST49718443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.862850904 CEST49718443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.862869978 CEST4434971834.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.863100052 CEST4434971834.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.863580942 CEST49718443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.863670111 CEST49720443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.863857985 CEST4434972034.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.863950014 CEST49720443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.863960981 CEST4434972034.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.864080906 CEST49719443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.864130974 CEST49719443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.864242077 CEST4434971935.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.864589930 CEST49723443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.864643097 CEST4434972334.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.864727020 CEST49719443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.865143061 CEST49723443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.865252972 CEST49723443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.865259886 CEST4434972334.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.944919109 CEST4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.950336933 CEST804971334.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.953574896 CEST4971380192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.075411081 CEST4434972034.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.075493097 CEST49720443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.076128960 CEST804972234.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.078982115 CEST49724443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.079035044 CEST4434972434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.088444948 CEST49724443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.088632107 CEST4972280192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.089988947 CEST49724443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.090008974 CEST4434972434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.093769073 CEST804972234.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.093839884 CEST4972280192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.325316906 CEST4434972334.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.325413942 CEST49723443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.328712940 CEST49723443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.328733921 CEST4434972334.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.329049110 CEST4434972334.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.331908941 CEST49723443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.331993103 CEST49723443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.332084894 CEST4434972334.160.144.191192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.332192898 CEST49723443192.168.2.534.160.144.191
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.419087887 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.423999071 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.439511061 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.442060947 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.447050095 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.555156946 CEST4434972434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.555171967 CEST4434972434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.555321932 CEST49724443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.559921026 CEST49724443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.559942007 CEST4434972434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.560039043 CEST49724443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.560106039 CEST4434972434.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.560436964 CEST49727443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.560467958 CEST4434972734.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.566910028 CEST49724443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.566942930 CEST49727443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.568538904 CEST49727443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.568562031 CEST4434972734.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.894640923 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.956569910 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.011243105 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.016141891 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.025615931 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.025998116 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.030836105 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.058640957 CEST4434972734.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.059967995 CEST49727443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.063678026 CEST49727443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.063685894 CEST4434972734.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.063765049 CEST49727443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.063990116 CEST4434972734.117.188.166192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.065840006 CEST49727443192.168.2.534.117.188.166
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.471551895 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.513839960 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.559916019 CEST49730443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.559956074 CEST4434973034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.579576015 CEST49730443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.580790997 CEST49730443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.580804110 CEST4434973034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:47.041623116 CEST4434973034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:47.041641951 CEST4434973034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:47.041732073 CEST49730443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:47.046900988 CEST49730443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:47.046915054 CEST4434973034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:47.046999931 CEST49730443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:47.047228098 CEST4434973034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:47.047286987 CEST49730443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.639779091 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.644644022 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.677743912 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.677779913 CEST4434973235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.678910017 CEST49733443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.678947926 CEST4434973334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.679997921 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.680085897 CEST49733443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.680087090 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.680094004 CEST4434973235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.681629896 CEST49733443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.681642056 CEST4434973334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.694150925 CEST49734443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.694200993 CEST4434973434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.708586931 CEST49734443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.710139990 CEST49734443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.710160017 CEST4434973434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.737535954 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.793215990 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.918418884 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.981343031 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.982769012 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.986875057 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.073734999 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.128182888 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.143485069 CEST4434973334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.144754887 CEST49733443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.150057077 CEST49733443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.150068045 CEST4434973334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.150149107 CEST49733443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.150232077 CEST4434973334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.152021885 CEST4434973235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.159143925 CEST49733443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.161657095 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.161942005 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.161951065 CEST4434973235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.162194967 CEST4434973235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.164563894 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.164650917 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.164715052 CEST4434973235.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.168648005 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.168670893 CEST49732443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.178452969 CEST4434973434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.178467989 CEST4434973434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.179358006 CEST49734443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.181720018 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.186417103 CEST49734443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.186440945 CEST4434973434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.186476946 CEST49734443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.186631918 CEST4434973434.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.186769009 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.186867952 CEST49734443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.192991018 CEST49735443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.193037033 CEST4434973534.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.194354057 CEST49735443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.195776939 CEST49735443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.195806980 CEST4434973534.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.207662106 CEST49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.207699060 CEST4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.208424091 CEST49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.208571911 CEST49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.208589077 CEST4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.211579084 CEST49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.211616039 CEST4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.212153912 CEST49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.212249994 CEST49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.212265015 CEST4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.278215885 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.330199957 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.354314089 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.359183073 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.449265957 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.503074884 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.654280901 CEST4434973534.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.656919956 CEST49735443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.678805113 CEST4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.678915024 CEST49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.706943035 CEST4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.707292080 CEST49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.730700970 CEST49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.730726957 CEST4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.731009960 CEST4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.732374907 CEST49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.732409000 CEST4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.732852936 CEST4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.740725040 CEST49735443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.740755081 CEST4434973534.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.740993977 CEST49735443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.741327047 CEST4434973534.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.749752998 CEST49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.749818087 CEST49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.749943018 CEST4434973634.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.750792027 CEST49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.750873089 CEST49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.751132965 CEST4434973734.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.751645088 CEST49735443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.751682043 CEST49737443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.751703024 CEST49736443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:51.043247938 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:51.048103094 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:51.147067070 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:51.188338041 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.069447994 CEST49744443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.069499016 CEST4434974434.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.069678068 CEST49744443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.071145058 CEST49744443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.071156979 CEST4434974434.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.137454987 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.142394066 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.233763933 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.275696039 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.528882980 CEST4434974434.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.528976917 CEST49744443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:56.850203037 CEST49744443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:56.850238085 CEST4434974434.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:56.850296974 CEST49744443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:56.850476027 CEST4434974434.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:56.851975918 CEST49744443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.014029026 CEST49761443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.014065981 CEST4434976134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.020585060 CEST49761443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.912024975 CEST49761443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.912058115 CEST4434976134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.912703037 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.953254938 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.044928074 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.099718094 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.231555939 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.236490965 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.328257084 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.369348049 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.418283939 CEST4434976134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.418306112 CEST4434976134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.418366909 CEST49761443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.422816992 CEST49761443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.422837019 CEST4434976134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.422913074 CEST49761443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.422993898 CEST4434976134.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.423329115 CEST49761443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.936053991 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.940941095 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.034064054 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.074747086 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.679822922 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.684734106 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.774365902 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.820440054 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.860205889 CEST49827443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.860238075 CEST4434982734.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.860430002 CEST49827443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.861960888 CEST49827443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.861974955 CEST4434982734.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.047353983 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.052294970 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.321374893 CEST4434982734.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.321466923 CEST49827443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.326370955 CEST49827443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.326380968 CEST4434982734.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.326487064 CEST49827443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.326597929 CEST4434982734.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.331804991 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.332617998 CEST49827443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.336772919 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.428529024 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.432805061 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.437607050 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.486293077 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.529397011 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.586600065 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.331177950 CEST49844443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.331238031 CEST4434984435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.338272095 CEST49844443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.338495970 CEST49844443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.338531971 CEST4434984435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.360868931 CEST49845443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.360897064 CEST4434984534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.362919092 CEST49845443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.363076925 CEST49845443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.363089085 CEST4434984534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.365997076 CEST49846443192.168.2.552.222.236.23
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.366060019 CEST4434984652.222.236.23192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.367468119 CEST49846443192.168.2.552.222.236.23
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.367656946 CEST49846443192.168.2.552.222.236.23
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.367681026 CEST4434984652.222.236.23192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.369203091 CEST49847443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.369216919 CEST4434984735.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.370002985 CEST49847443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.371336937 CEST49847443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.371351957 CEST4434984735.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.378227949 CEST49848443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.378268003 CEST4434984835.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.384812117 CEST49848443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.386807919 CEST49848443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.386827946 CEST4434984835.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.814606905 CEST4434984435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.814625978 CEST4434984435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.817323923 CEST49844443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.820367098 CEST49844443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.820413113 CEST4434984435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.820774078 CEST4434984435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.823405027 CEST49844443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.823496103 CEST49844443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.823638916 CEST4434984435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.824173927 CEST49844443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.828660965 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.833673954 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.858506918 CEST4434984534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.860035896 CEST49845443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.864015102 CEST49845443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.864027023 CEST4434984534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.864300013 CEST4434984534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.865891933 CEST4434984735.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.866302013 CEST49847443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.868130922 CEST49845443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.868294954 CEST4434984534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.868371964 CEST49845443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.868381977 CEST4434984534.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.869642019 CEST49845443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.871536016 CEST49847443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.871547937 CEST4434984735.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.871742010 CEST49847443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.871754885 CEST4434984735.190.72.216192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.872098923 CEST49847443192.168.2.535.190.72.216
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.925136089 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.928752899 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.936094999 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.975899935 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.228579044 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.229159117 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.229960918 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.238923073 CEST4434984652.222.236.23192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.239250898 CEST49846443192.168.2.552.222.236.23
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.242557049 CEST49846443192.168.2.552.222.236.23
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.242575884 CEST4434984652.222.236.23192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.242854118 CEST4434984652.222.236.23192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.245479107 CEST49846443192.168.2.552.222.236.23
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.245635986 CEST49846443192.168.2.552.222.236.23
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.245675087 CEST4434984652.222.236.23192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.245795965 CEST49846443192.168.2.552.222.236.23
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.250479937 CEST4434984835.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.250495911 CEST4434984835.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.250565052 CEST49848443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.255527020 CEST49848443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.255532980 CEST4434984835.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.255621910 CEST49848443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.255784035 CEST4434984835.201.103.21192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.256445885 CEST49848443192.168.2.535.201.103.21
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.259166956 CEST49854443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.259180069 CEST4434985435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.259373903 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.259391069 CEST4434985535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.260539055 CEST49854443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.260677099 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.260773897 CEST49854443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.260787010 CEST4434985435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.260936022 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.260948896 CEST4434985535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.262845039 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.262873888 CEST4434985635.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.263494968 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.263632059 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.263643026 CEST4434985635.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.265400887 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.265687943 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.266279936 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.270221949 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.272851944 CEST49857443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.272864103 CEST4434985734.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.273066998 CEST49857443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.273197889 CEST49857443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.273209095 CEST4434985734.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.365226030 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.369303942 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.374248028 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.414855957 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.464621067 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.515114069 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.719964027 CEST4434985435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.720294952 CEST49854443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.723922014 CEST49854443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.723937988 CEST4434985435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.724227905 CEST4434985435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.726793051 CEST49854443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.726914883 CEST49854443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.726941109 CEST4434985435.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.731327057 CEST49854443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.731739998 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.736640930 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.744240046 CEST4434985535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.744358063 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.745835066 CEST4434985635.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.746340990 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.747745037 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.747755051 CEST4434985535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.748014927 CEST4434985535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.750142097 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.750147104 CEST4434985635.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.750408888 CEST4434985635.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.752691984 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.752799034 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.752844095 CEST4434985535.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.752881050 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.752949953 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.753017902 CEST4434985635.244.181.201192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.753372908 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.753406048 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.753421068 CEST49855443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.753433943 CEST49856443192.168.2.535.244.181.201
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.754136086 CEST4434985734.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.754556894 CEST49857443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.757318974 CEST49857443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.757338047 CEST4434985734.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.757677078 CEST4434985734.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.760289907 CEST49857443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.760358095 CEST49857443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.760495901 CEST4434985734.149.100.209192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.761354923 CEST49857443192.168.2.534.149.100.209
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.828411102 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.832356930 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.837193012 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.878480911 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.926884890 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.978749990 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:22.845474958 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:22.945765018 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:23.036335945 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:23.036353111 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:26.637716055 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:26.637763023 CEST44363900142.250.81.238192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:26.638163090 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:26.638358116 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:26.638377905 CEST44363900142.250.81.238192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.125111103 CEST44363900142.250.81.238192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.125237942 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.126188993 CEST44363900142.250.81.238192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.126353979 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.128685951 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.128717899 CEST44363900142.250.81.238192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.129056931 CEST44363900142.250.81.238192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.130301952 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.130405903 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.130523920 CEST44363900142.250.81.238192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.130593061 CEST63900443192.168.2.5142.250.81.238
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.135947943 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.140821934 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.236498117 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.239537954 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.244483948 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.289735079 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.334125996 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.374499083 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.500897884 CEST63919443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.500965118 CEST4436391934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.501048088 CEST63919443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.502408981 CEST63919443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.502437115 CEST4436391934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.995193958 CEST4436391934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.995364904 CEST63919443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.000128984 CEST63919443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.000152111 CEST4436391934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.000253916 CEST63919443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.000332117 CEST4436391934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.005152941 CEST63919443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.007972956 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.012892008 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.251123905 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.255104065 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.260014057 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.295247078 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.350171089 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.398216963 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.502053976 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.506870985 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.599246025 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.602313042 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.607274055 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.644196987 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.697583914 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.744463921 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.732783079 CEST63989443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.732814074 CEST4436398934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.733037949 CEST63990443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.733046055 CEST4436399034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.733971119 CEST63989443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.734134912 CEST63989443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.734134912 CEST63990443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.734147072 CEST4436398934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.734265089 CEST63990443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.734273911 CEST4436399034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.206032038 CEST4436399034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.206110954 CEST63990443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.209229946 CEST63990443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.209238052 CEST4436399034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.209482908 CEST4436399034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.211461067 CEST63990443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.211580992 CEST63990443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.211615086 CEST4436399034.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.211932898 CEST63990443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.218770981 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.223957062 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.241735935 CEST4436398934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.241827011 CEST63989443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.245146990 CEST63989443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.245151997 CEST4436398934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.245512962 CEST4436398934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.248279095 CEST63989443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.248380899 CEST63989443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.248470068 CEST4436398934.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.248678923 CEST63989443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.324246883 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.360888004 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.365817070 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.376187086 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.455821991 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.498644114 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:51.326858044 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:51.332264900 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:51.458359957 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:51.463535070 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:01.333518028 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:01.338577986 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:01.471581936 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:01.476661921 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.208828926 CEST63999443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.208858013 CEST4436399934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.208951950 CEST63999443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.210406065 CEST63999443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.210421085 CEST4436399934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.710366964 CEST4436399934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.710506916 CEST63999443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.715797901 CEST63999443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.715821981 CEST4436399934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.715967894 CEST63999443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.716320992 CEST4436399934.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.716852903 CEST63999443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.719064951 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.723962069 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.817512035 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.821773052 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.826756001 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.861555099 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.917314053 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.961865902 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:20.826867104 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:20.831969976 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:20.927028894 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:20.932111025 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:30.847157955 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:30.852097988 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:30.931442976 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:30.936323881 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:40.860685110 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:40.865864992 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:40.945277929 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:40.950854063 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:50.874839067 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:50.879827976 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:50.959563017 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:50.964598894 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:00.889314890 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:00.894995928 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:00.973905087 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:00.978880882 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:10.907665014 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:10.912733078 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:10.993129015 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:10.998112917 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:20.921297073 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:20.926233053 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:20.999408960 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:21.004492044 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:30.928994894 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:30.934258938 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.013647079 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.018755913 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.893610001 CEST64000443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.893704891 CEST4436400034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.893841028 CEST64000443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.895162106 CEST64000443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.895198107 CEST4436400034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.384092093 CEST4436400034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.386606932 CEST64000443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.395420074 CEST64000443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.395443916 CEST4436400034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.395520926 CEST64000443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.395951033 CEST4436400034.107.243.93192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.396455050 CEST64000443192.168.2.534.107.243.93
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.398346901 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.403254986 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.494942904 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.498449087 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.503470898 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.555811882 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.593358040 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.633944035 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.587657928 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.587723017 CEST4436400134.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.587913036 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.587924004 CEST4436400234.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588042021 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588088036 CEST4436400334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588114977 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588157892 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588252068 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588366985 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588378906 CEST4436400134.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588489056 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588500023 CEST4436400234.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588629007 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588646889 CEST4436400334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.046916008 CEST4436400234.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.051431894 CEST4436400234.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.054235935 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.057477951 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.057507038 CEST4436400234.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.058295965 CEST4436400234.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.059112072 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.059190989 CEST4436400334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.059251070 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.059554100 CEST4436400234.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.060966015 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.061006069 CEST64002443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.061011076 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.063410044 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.063431978 CEST4436400334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.063788891 CEST4436400334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.065058947 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.065151930 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.065268040 CEST4436400334.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.065613985 CEST4436400134.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.067120075 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.067929983 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.067956924 CEST64003443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.067971945 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.071041107 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.071068048 CEST4436400134.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.071299076 CEST4436400134.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.072065115 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.073160887 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.073230982 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.073329926 CEST4436400134.120.208.123192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.078912973 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.078952074 CEST64001443192.168.2.534.120.208.123
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.164676905 CEST804972534.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.168217897 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.173285007 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.217006922 CEST4972580192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.264476061 CEST804972934.107.221.82192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.317421913 CEST4972980192.168.2.534.107.221.82
                                                                                                                                                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.963429928 CEST5223453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.970937967 CEST53522341.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.002919912 CEST5429253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.011240005 CEST53542921.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.707154989 CEST6497453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.716934919 CEST53649741.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.720088005 CEST5327753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.726874113 CEST53532771.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.727699995 CEST4921853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.735222101 CEST53492181.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.838848114 CEST5639753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.849149942 CEST6549453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.856375933 CEST53654941.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.857088089 CEST6308253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.864007950 CEST53630821.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.111417055 CEST5257953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.121314049 CEST53525791.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.122462988 CEST6458353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.124059916 CEST6028953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.129451990 CEST53645831.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.131124973 CEST53602891.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.143244982 CEST5616953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.145499945 CEST5501953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.150434971 CEST53561691.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.152724028 CEST53550191.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.170366049 CEST5651753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.177090883 CEST53565171.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.998817921 CEST5139753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.005573988 CEST53513971.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.270881891 CEST6362953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.271431923 CEST5120753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.326704025 CEST5850553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.332720995 CEST6092153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384635925 CEST53636291.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384655952 CEST53609211.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.385852098 CEST53512071.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.386220932 CEST5335453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.386924982 CEST5377353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.393882990 CEST53533541.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.393929005 CEST53537731.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.394701958 CEST6039453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.401649952 CEST53603941.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.530368090 CEST5456453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.564349890 CEST53534201.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.988141060 CEST6169353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.998461962 CEST5522453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.005876064 CEST53552241.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.019409895 CEST6041753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.026371002 CEST53604171.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.045770884 CEST4941553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.054083109 CEST53494151.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.649636030 CEST6366353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.652348995 CEST5629853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.656523943 CEST53636631.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.663022041 CEST53562981.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.666925907 CEST5862153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.674500942 CEST53586211.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.679651976 CEST6466353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.682358980 CEST4944953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.685096025 CEST6059753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.688111067 CEST53646631.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.689014912 CEST6378153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.690629959 CEST53494491.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.692523956 CEST53605971.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.694967985 CEST6408453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.696346045 CEST53637811.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.703216076 CEST53640841.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.709249020 CEST6506653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.717679024 CEST53650661.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:54.511404037 CEST6345353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:54.518654108 CEST53634531.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.015290022 CEST5228353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.022934914 CEST53522831.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.099159002 CEST5447953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.099596024 CEST6102453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.099596024 CEST6521353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST53544791.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.107201099 CEST53652131.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.107238054 CEST53610241.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.108072042 CEST6341653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.108072042 CEST5886853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.108520985 CEST5335953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST53634161.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114999056 CEST53533591.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.115582943 CEST5991053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.115659952 CEST53588681.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.115744114 CEST5280553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.116096973 CEST5031753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123087883 CEST53528051.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123243093 CEST53599101.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123668909 CEST5369553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.124033928 CEST53503171.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.124161005 CEST5916853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.131056070 CEST53591681.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.131498098 CEST53536951.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.138102055 CEST6330553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.138257027 CEST6336353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.145108938 CEST53633631.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.145678997 CEST5798053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.146909952 CEST53633051.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.147478104 CEST5731153192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.152443886 CEST53579801.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.155338049 CEST53573111.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.850414991 CEST5131053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.859208107 CEST53513101.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.859792948 CEST6156853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.866499901 CEST53615681.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.332364082 CEST5004053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.339513063 CEST53500401.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.357311010 CEST6362853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.365143061 CEST53636281.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.367400885 CEST6193353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.369452000 CEST5845353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.376914978 CEST53584531.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.377549887 CEST53619331.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.379405022 CEST5508853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.386106968 CEST53550881.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.389550924 CEST6221653192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.390274048 CEST5844953192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.397464991 CEST53622161.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.608016014 CEST53584491.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:25.201900005 CEST53633141.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.500341892 CEST5368553192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.507616043 CEST53536851.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.508763075 CEST6183853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.515960932 CEST53618381.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.730483055 CEST5948253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.737559080 CEST53594821.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.219656944 CEST5051353192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.200586081 CEST6492053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.207551956 CEST53649201.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.208736897 CEST5121453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.215847015 CEST53512141.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.876945972 CEST6544853192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.884222984 CEST53654481.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.885595083 CEST6046253192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.892746925 CEST53604621.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.893212080 CEST6254453192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.901715994 CEST53625441.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.398642063 CEST5838053192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588196039 CEST5543753192.168.2.51.1.1.1
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.595082045 CEST53554371.1.1.1192.168.2.5
                                                                                                                                                                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.963429928 CEST192.168.2.51.1.1.10xcd31Standard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.002919912 CEST192.168.2.51.1.1.10x6c22Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.707154989 CEST192.168.2.51.1.1.10x2a0Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.720088005 CEST192.168.2.51.1.1.10x601eStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.727699995 CEST192.168.2.51.1.1.10xa25dStandard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.838848114 CEST192.168.2.51.1.1.10x88bdStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.849149942 CEST192.168.2.51.1.1.10x3864Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.857088089 CEST192.168.2.51.1.1.10xb024Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.111417055 CEST192.168.2.51.1.1.10x4f27Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.122462988 CEST192.168.2.51.1.1.10x982Standard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.124059916 CEST192.168.2.51.1.1.10xadb0Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.143244982 CEST192.168.2.51.1.1.10xe98dStandard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.145499945 CEST192.168.2.51.1.1.10xeb67Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.170366049 CEST192.168.2.51.1.1.10xa8a3Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.998817921 CEST192.168.2.51.1.1.10xd59aStandard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.270881891 CEST192.168.2.51.1.1.10xa6e0Standard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.271431923 CEST192.168.2.51.1.1.10x1a7Standard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.326704025 CEST192.168.2.51.1.1.10x7bb3Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.332720995 CEST192.168.2.51.1.1.10x2301Standard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.386220932 CEST192.168.2.51.1.1.10x51c4Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.386924982 CEST192.168.2.51.1.1.10xeb6fStandard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.394701958 CEST192.168.2.51.1.1.10xea9dStandard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.530368090 CEST192.168.2.51.1.1.10x10bStandard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.988141060 CEST192.168.2.51.1.1.10x7541Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.998461962 CEST192.168.2.51.1.1.10x1291Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.019409895 CEST192.168.2.51.1.1.10x34cfStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.045770884 CEST192.168.2.51.1.1.10x3d2dStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.649636030 CEST192.168.2.51.1.1.10xcbb9Standard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.652348995 CEST192.168.2.51.1.1.10x694fStandard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.666925907 CEST192.168.2.51.1.1.10x2a05Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.679651976 CEST192.168.2.51.1.1.10xb7dbStandard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.682358980 CEST192.168.2.51.1.1.10x1141Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.685096025 CEST192.168.2.51.1.1.10xb0dcStandard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.689014912 CEST192.168.2.51.1.1.10x6af9Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.694967985 CEST192.168.2.51.1.1.10x4da8Standard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.709249020 CEST192.168.2.51.1.1.10x82c6Standard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:54.511404037 CEST192.168.2.51.1.1.10x280fStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.015290022 CEST192.168.2.51.1.1.10x48d6Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.099159002 CEST192.168.2.51.1.1.10x1285Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.099596024 CEST192.168.2.51.1.1.10x44d8Standard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.099596024 CEST192.168.2.51.1.1.10x36baStandard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.108072042 CEST192.168.2.51.1.1.10x6073Standard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.108072042 CEST192.168.2.51.1.1.10x83dcStandard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.108520985 CEST192.168.2.51.1.1.10xe2d0Standard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.115582943 CEST192.168.2.51.1.1.10x926aStandard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.115744114 CEST192.168.2.51.1.1.10x944fStandard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.116096973 CEST192.168.2.51.1.1.10x6e69Standard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123668909 CEST192.168.2.51.1.1.10x9a45Standard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.124161005 CEST192.168.2.51.1.1.10x4304Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.138102055 CEST192.168.2.51.1.1.10x2549Standard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.138257027 CEST192.168.2.51.1.1.10xddccStandard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.145678997 CEST192.168.2.51.1.1.10xde1fStandard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.147478104 CEST192.168.2.51.1.1.10xb561Standard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.850414991 CEST192.168.2.51.1.1.10xee87Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.859792948 CEST192.168.2.51.1.1.10xae02Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.332364082 CEST192.168.2.51.1.1.10xd3d3Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.357311010 CEST192.168.2.51.1.1.10x1a3dStandard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.367400885 CEST192.168.2.51.1.1.10x83c1Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.369452000 CEST192.168.2.51.1.1.10xe41aStandard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.379405022 CEST192.168.2.51.1.1.10x2ec6Standard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.389550924 CEST192.168.2.51.1.1.10x2d48Standard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.390274048 CEST192.168.2.51.1.1.10xc5d6Standard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.500341892 CEST192.168.2.51.1.1.10x77cdStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.508763075 CEST192.168.2.51.1.1.10xb827Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.730483055 CEST192.168.2.51.1.1.10xba04Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.219656944 CEST192.168.2.51.1.1.10xc859Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.200586081 CEST192.168.2.51.1.1.10xb083Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.208736897 CEST192.168.2.51.1.1.10x5befStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.876945972 CEST192.168.2.51.1.1.10xc708Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.885595083 CEST192.168.2.51.1.1.10x33b1Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.893212080 CEST192.168.2.51.1.1.10x913cStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.398642063 CEST192.168.2.51.1.1.10x7cf4Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.588196039 CEST192.168.2.51.1.1.10x3c18Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.933451891 CEST1.1.1.1192.168.2.50x9959No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:41.970937967 CEST1.1.1.1192.168.2.50xcd31No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.716934919 CEST1.1.1.1192.168.2.50x2a0No error (0)youtube.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.726874113 CEST1.1.1.1192.168.2.50x601eNo error (0)youtube.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.735222101 CEST1.1.1.1192.168.2.50xa25dNo error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.847075939 CEST1.1.1.1192.168.2.50x88bdNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.847075939 CEST1.1.1.1192.168.2.50x88bdNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.856375933 CEST1.1.1.1192.168.2.50x3864No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.864007950 CEST1.1.1.1192.168.2.50xb024No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.121314049 CEST1.1.1.1192.168.2.50x4f27No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.129451990 CEST1.1.1.1192.168.2.50x982No error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.129451990 CEST1.1.1.1192.168.2.50x982No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.131124973 CEST1.1.1.1192.168.2.50xadb0No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.150434971 CEST1.1.1.1192.168.2.50xe98dNo error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.998183966 CEST1.1.1.1192.168.2.50x517cNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.998183966 CEST1.1.1.1192.168.2.50x517cNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.005573988 CEST1.1.1.1192.168.2.50xd59aNo error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384635925 CEST1.1.1.1192.168.2.50xa6e0No error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384635925 CEST1.1.1.1192.168.2.50xa6e0No error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384655952 CEST1.1.1.1192.168.2.50x2301No error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384655952 CEST1.1.1.1192.168.2.50x2301No error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384655952 CEST1.1.1.1192.168.2.50x2301No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384944916 CEST1.1.1.1192.168.2.50x7bb3No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.384944916 CEST1.1.1.1192.168.2.50x7bb3No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.385852098 CEST1.1.1.1192.168.2.50x1a7No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.393882990 CEST1.1.1.1192.168.2.50x51c4No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.401649952 CEST1.1.1.1192.168.2.50xea9dNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.537653923 CEST1.1.1.1192.168.2.50x10bNo error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.995309114 CEST1.1.1.1192.168.2.50x7541No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.995309114 CEST1.1.1.1192.168.2.50x7541No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.005876064 CEST1.1.1.1192.168.2.50x1291No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.026371002 CEST1.1.1.1192.168.2.50x34cfNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.649473906 CEST1.1.1.1192.168.2.50xcb6bNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.654572964 CEST1.1.1.1192.168.2.50x958bNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.654572964 CEST1.1.1.1192.168.2.50x958bNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.656523943 CEST1.1.1.1192.168.2.50xcbb9No error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.656523943 CEST1.1.1.1192.168.2.50xcbb9No error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.656523943 CEST1.1.1.1192.168.2.50xcbb9No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.674500942 CEST1.1.1.1192.168.2.50x2a05No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.688111067 CEST1.1.1.1192.168.2.50xb7dbNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.692523956 CEST1.1.1.1192.168.2.50xb0dcNo error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.692523956 CEST1.1.1.1192.168.2.50xb0dcNo error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.703216076 CEST1.1.1.1192.168.2.50x4da8No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.190351963 CEST1.1.1.1192.168.2.50xbbb2No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.106719971 CEST1.1.1.1192.168.2.50x1285No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.107201099 CEST1.1.1.1192.168.2.50x36baNo error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.107201099 CEST1.1.1.1192.168.2.50x36baNo error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.107238054 CEST1.1.1.1192.168.2.50x44d8No error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.107238054 CEST1.1.1.1192.168.2.50x44d8No error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114970922 CEST1.1.1.1192.168.2.50x6073No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.114999056 CEST1.1.1.1192.168.2.50xe2d0No error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.115659952 CEST1.1.1.1192.168.2.50x83dcNo error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123087883 CEST1.1.1.1192.168.2.50x944fNo error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123243093 CEST1.1.1.1192.168.2.50x926aNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123243093 CEST1.1.1.1192.168.2.50x926aNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123243093 CEST1.1.1.1192.168.2.50x926aNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.123243093 CEST1.1.1.1192.168.2.50x926aNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.124033928 CEST1.1.1.1192.168.2.50x6e69No error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.131056070 CEST1.1.1.1192.168.2.50x4304No error (0)twitter.com104.244.42.193A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.131498098 CEST1.1.1.1192.168.2.50x9a45No error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.131498098 CEST1.1.1.1192.168.2.50x9a45No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.131498098 CEST1.1.1.1192.168.2.50x9a45No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.131498098 CEST1.1.1.1192.168.2.50x9a45No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.131498098 CEST1.1.1.1192.168.2.50x9a45No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.145108938 CEST1.1.1.1192.168.2.50xddccNo error (0)twitter.com104.244.42.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.146909952 CEST1.1.1.1192.168.2.50x2549No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.146909952 CEST1.1.1.1192.168.2.50x2549No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.146909952 CEST1.1.1.1192.168.2.50x2549No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.146909952 CEST1.1.1.1192.168.2.50x2549No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:08.859208107 CEST1.1.1.1192.168.2.50xee87No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.365143061 CEST1.1.1.1192.168.2.50x1a3dNo error (0)services.addons.mozilla.org52.222.236.23A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.365143061 CEST1.1.1.1192.168.2.50x1a3dNo error (0)services.addons.mozilla.org52.222.236.80A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.365143061 CEST1.1.1.1192.168.2.50x1a3dNo error (0)services.addons.mozilla.org52.222.236.48A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.365143061 CEST1.1.1.1192.168.2.50x1a3dNo error (0)services.addons.mozilla.org52.222.236.120A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.376914978 CEST1.1.1.1192.168.2.50xe41aNo error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.376914978 CEST1.1.1.1192.168.2.50xe41aNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.377549887 CEST1.1.1.1192.168.2.50x83c1No error (0)services.addons.mozilla.org52.222.236.120A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.377549887 CEST1.1.1.1192.168.2.50x83c1No error (0)services.addons.mozilla.org52.222.236.48A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.377549887 CEST1.1.1.1192.168.2.50x83c1No error (0)services.addons.mozilla.org52.222.236.23A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.377549887 CEST1.1.1.1192.168.2.50x83c1No error (0)services.addons.mozilla.org52.222.236.80A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.386106968 CEST1.1.1.1192.168.2.50x2ec6No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.743082047 CEST1.1.1.1192.168.2.50xde60No error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.743082047 CEST1.1.1.1192.168.2.50xde60No error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:29.507616043 CEST1.1.1.1192.168.2.50x77cdNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:40.724875927 CEST1.1.1.1192.168.2.50x8943No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.226928949 CEST1.1.1.1192.168.2.50xc859No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.226928949 CEST1.1.1.1192.168.2.50xc859No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.207551956 CEST1.1.1.1192.168.2.50xb083No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.884222984 CEST1.1.1.1192.168.2.50xc708No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:31.892746925 CEST1.1.1.1192.168.2.50x33b1No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.405810118 CEST1.1.1.1192.168.2.50x7cf4No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.405810118 CEST1.1.1.1192.168.2.50x7cf4No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:41.586481094 CEST1.1.1.1192.168.2.50xb4ebNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                            • detectportal.firefox.com
                                                                                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                            0192.168.2.54971334.107.221.82803680C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:42.905208111 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:43.420598984 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12153
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.469114065 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.569230080 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12154
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                            1192.168.2.54972234.107.221.82803680C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:44.631020069 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.076128960 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Wed, 09 Oct 2024 20:22:55 GMT
                                                                                                                                                                                                                                                                            Age: 58790
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success


                                                                                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                            2192.168.2.54972534.107.221.82803680C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.442060947 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:45.894640923 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12155
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.639779091 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.737535954 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12159
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.981343031 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12159
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.181720018 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.278215885 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12160
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:51.043247938 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:51.147067070 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12161
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:57.912703037 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.044928074 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12168
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.936053991 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.034064054 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12169
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.047353983 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.331804991 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.428529024 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12179
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.828660965 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.925136089 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12181
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.229159117 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12181
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.265400887 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.365226030 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12182
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.731739998 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.828411102 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12182
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:22.845474958 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.135947943 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.236498117 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12197
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.007972956 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.251123905 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12200
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.502053976 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.599246025 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12205
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.218770981 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.324246883 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12211
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:51.326858044 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:01.333518028 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.719064951 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.817512035 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12240
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:20.826867104 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:30.847157955 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:40.860685110 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:50.874839067 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:00.889314890 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:10.907665014 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.398346901 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.494942904 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12322
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.067120075 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.164676905 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 90
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 09:20:10 GMT
                                                                                                                                                                                                                                                                            Age: 12332
                                                                                                                                                                                                                                                                            Content-Type: text/html
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                            Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                            3192.168.2.54972934.107.221.82803680C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.025998116 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:46.471551895 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27122
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:49.918418884 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.073734999 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27126
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.354314089 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:50.449265957 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27126
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.137454987 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:55.233763933 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27131
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.231555939 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:58.328257084 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27134
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.679822922 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:42:59.774365902 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27135
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.432805061 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:09.529397011 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27145
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:11.928752899 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.228579044 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27148
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.265687943 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27148
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.369303942 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.464621067 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27148
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.832356930 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:12.926884890 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27148
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:22.945765018 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.239537954 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:27.334125996 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27163
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.255104065 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:30.350171089 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27166
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.602313042 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:35.697583914 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27171
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.360888004 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:41.455821991 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27177
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:43:51.458359957 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:01.471581936 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.821773052 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:10.917314053 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27206
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:20.927028894 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:30.931442976 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:40.945277929 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:44:50.959563017 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:00.973905087 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:10.993129015 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:20.999408960 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                            Data Ascii:
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.498449087 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:32.593358040 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27288
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.168217897 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                            Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                            Accept: */*
                                                                                                                                                                                                                                                                            Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                            Connection: keep-alive
                                                                                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                                                                                            Oct 10, 2024 14:45:42.264476061 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                                                                                            Via: 1.1 google
                                                                                                                                                                                                                                                                            Date: Thu, 10 Oct 2024 05:10:44 GMT
                                                                                                                                                                                                                                                                            Age: 27298
                                                                                                                                                                                                                                                                            Content-Type: text/plain
                                                                                                                                                                                                                                                                            Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                            Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                            Data Ascii: success


                                                                                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                                                                                            Click to dive into process behavior distribution

                                                                                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                                                                                            Target ID:0
                                                                                                                                                                                                                                                                            Start time:08:42:35
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                                                                            Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                                                                            Imagebase:0xa90000
                                                                                                                                                                                                                                                                            File size:919'552 bytes
                                                                                                                                                                                                                                                                            MD5 hash:73FB1DA6C85604B6CD17AC7334EC9AA4
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Yara matches:
                                                                                                                                                                                                                                                                            • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000003.2093134086.0000000001547000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                                                            • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000003.2093042238.000000000153F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                                                            Reputation:low
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:1
                                                                                                                                                                                                                                                                            Start time:08:42:36
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                                                                            Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                                                                            Imagebase:0x650000
                                                                                                                                                                                                                                                                            File size:74'240 bytes
                                                                                                                                                                                                                                                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:2
                                                                                                                                                                                                                                                                            Start time:08:42:36
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:4
                                                                                                                                                                                                                                                                            Start time:08:42:38
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                                                                            Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                                                                            Imagebase:0x650000
                                                                                                                                                                                                                                                                            File size:74'240 bytes
                                                                                                                                                                                                                                                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:5
                                                                                                                                                                                                                                                                            Start time:08:42:38
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:6
                                                                                                                                                                                                                                                                            Start time:08:42:38
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                                                                            Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                                                                            Imagebase:0x650000
                                                                                                                                                                                                                                                                            File size:74'240 bytes
                                                                                                                                                                                                                                                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:7
                                                                                                                                                                                                                                                                            Start time:08:42:38
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:8
                                                                                                                                                                                                                                                                            Start time:08:42:38
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                                                                            Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                                                                            Imagebase:0x650000
                                                                                                                                                                                                                                                                            File size:74'240 bytes
                                                                                                                                                                                                                                                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:9
                                                                                                                                                                                                                                                                            Start time:08:42:38
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:10
                                                                                                                                                                                                                                                                            Start time:08:42:38
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                                                                            Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                                                                            Imagebase:0x650000
                                                                                                                                                                                                                                                                            File size:74'240 bytes
                                                                                                                                                                                                                                                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:11
                                                                                                                                                                                                                                                                            Start time:08:42:38
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:12
                                                                                                                                                                                                                                                                            Start time:08:42:39
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                            Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                            File size:676'768 bytes
                                                                                                                                                                                                                                                                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:13
                                                                                                                                                                                                                                                                            Start time:08:42:39
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                                                                            Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                            File size:676'768 bytes
                                                                                                                                                                                                                                                                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                                                                            Target ID:14
                                                                                                                                                                                                                                                                            Start time:08:42:39
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                            Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                            File size:676'768 bytes
                                                                                                                                                                                                                                                                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                                                                            Target ID:16
                                                                                                                                                                                                                                                                            Start time:08:42:40
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c14e869-f22e-404d-808f-35b8a7c9dc63} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc77d6db10 socket
                                                                                                                                                                                                                                                                            Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                            File size:676'768 bytes
                                                                                                                                                                                                                                                                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                                                                            Target ID:17
                                                                                                                                                                                                                                                                            Start time:08:42:41
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4160 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7433fba-7232-4ec4-b493-79a0f3f4b22b} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a533910 rdd
                                                                                                                                                                                                                                                                            Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                            File size:676'768 bytes
                                                                                                                                                                                                                                                                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                                                                            Target ID:18
                                                                                                                                                                                                                                                                            Start time:08:42:49
                                                                                                                                                                                                                                                                            Start date:10/10/2024
                                                                                                                                                                                                                                                                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                                                                            Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4984 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5076 -prefMapHandle 5072 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7d976b1-7973-4dff-9762-38c41794fbe0} 3680 "\\.\pipe\gecko-crash-server-pipe.3680" 1cc0a2af710 utility
                                                                                                                                                                                                                                                                            Imagebase:0x7ff79f9e0000
                                                                                                                                                                                                                                                                            File size:676'768 bytes
                                                                                                                                                                                                                                                                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                                                                            Reset < >

                                                                                                                                                                                                                                                                              Execution Graph

                                                                                                                                                                                                                                                                              Execution Coverage:2.1%
                                                                                                                                                                                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                                              Signature Coverage:4.1%
                                                                                                                                                                                                                                                                              Total number of Nodes:1625
                                                                                                                                                                                                                                                                              Total number of Limit Nodes:67
                                                                                                                                                                                                                                                                              execution_graph 95823 a91cad SystemParametersInfoW 95824 b22a55 95832 b01ebc 95824->95832 95827 b22a70 95834 af39c0 22 API calls 95827->95834 95828 b22a87 95830 b22a7c 95835 af417d 22 API calls __fread_nolock 95830->95835 95833 b01ec3 IsWindow 95832->95833 95833->95827 95833->95828 95834->95830 95835->95828 95836 ad2ba5 95837 ad2baf 95836->95837 95838 a92b25 95836->95838 95882 a93a5a 95837->95882 95864 a92b83 7 API calls 95838->95864 95842 ad2bb8 95889 a99cb3 95842->95889 95845 a92b2f 95855 a92b44 95845->95855 95868 a93837 95845->95868 95846 ad2bc6 95847 ad2bce 95846->95847 95848 ad2bf5 95846->95848 95895 a933c6 95847->95895 95851 a933c6 22 API calls 95848->95851 95853 ad2bf1 GetForegroundWindow ShellExecuteW 95851->95853 95858 ad2c26 95853->95858 95856 a92b5f 95855->95856 95878 a930f2 95855->95878 95862 a92b66 SetCurrentDirectoryW 95856->95862 95858->95856 95860 ad2be7 95861 a933c6 22 API calls 95860->95861 95861->95853 95863 a92b7a 95862->95863 95905 a92cd4 7 API calls 95864->95905 95866 a92b2a 95867 a92c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95866->95867 95867->95845 95869 a93862 ___scrt_fastfail 95868->95869 95906 a94212 95869->95906 95872 a938e8 95874 ad3386 Shell_NotifyIconW 95872->95874 95875 a93906 Shell_NotifyIconW 95872->95875 95910 a93923 95875->95910 95877 a9391c 95877->95855 95879 a93154 95878->95879 95880 a93104 ___scrt_fastfail 95878->95880 95879->95856 95881 a93123 Shell_NotifyIconW 95880->95881 95881->95879 95999 ad1f50 95882->95999 95885 a99cb3 22 API calls 95886 a93a8d 95885->95886 96001 a93aa2 95886->96001 95888 a93a97 95888->95842 95890 a99cc2 _wcslen 95889->95890 95891 aafe0b 22 API calls 95890->95891 95892 a99cea __fread_nolock 95891->95892 95893 aafddb 22 API calls 95892->95893 95894 a99d00 95893->95894 95894->95846 95896 a933dd 95895->95896 95897 ad30bb 95895->95897 96021 a933ee 95896->96021 95899 aafddb 22 API calls 95897->95899 95901 ad30c5 _wcslen 95899->95901 95900 a933e8 95904 a96350 22 API calls 95900->95904 95902 aafe0b 22 API calls 95901->95902 95903 ad30fe __fread_nolock 95902->95903 95904->95860 95905->95866 95907 ad35a4 95906->95907 95908 a938b7 95906->95908 95907->95908 95909 ad35ad DestroyIcon 95907->95909 95908->95872 95932 afc874 42 API calls _strftime 95908->95932 95909->95908 95911 a9393f 95910->95911 95930 a93a13 95910->95930 95933 a96270 95911->95933 95914 a9395a 95938 a96b57 95914->95938 95915 ad3393 LoadStringW 95917 ad33ad 95915->95917 95925 a93994 ___scrt_fastfail 95917->95925 95951 a9a8c7 22 API calls __fread_nolock 95917->95951 95918 a9396f 95919 ad33c9 95918->95919 95920 a9397c 95918->95920 95952 a96350 22 API calls 95919->95952 95920->95917 95922 a93986 95920->95922 95950 a96350 22 API calls 95922->95950 95928 a939f9 Shell_NotifyIconW 95925->95928 95926 ad33d7 95926->95925 95927 a933c6 22 API calls 95926->95927 95929 ad33f9 95927->95929 95928->95930 95931 a933c6 22 API calls 95929->95931 95930->95877 95931->95925 95932->95872 95953 aafe0b 95933->95953 95935 a96295 95963 aafddb 95935->95963 95937 a9394d 95937->95914 95937->95915 95939 ad4ba1 95938->95939 95940 a96b67 _wcslen 95938->95940 95989 a993b2 95939->95989 95943 a96b7d 95940->95943 95944 a96ba2 95940->95944 95942 ad4baa 95942->95942 95988 a96f34 22 API calls 95943->95988 95945 aafddb 22 API calls 95944->95945 95947 a96bae 95945->95947 95949 aafe0b 22 API calls 95947->95949 95948 a96b85 __fread_nolock 95948->95918 95949->95948 95950->95925 95951->95925 95952->95926 95956 aafddb 95953->95956 95955 aafdfa 95955->95935 95956->95955 95958 aafdfc 95956->95958 95973 abea0c 95956->95973 95980 ab4ead 7 API calls 2 library calls 95956->95980 95962 ab066d 95958->95962 95981 ab32a4 RaiseException 95958->95981 95960 ab068a 95960->95935 95982 ab32a4 RaiseException 95962->95982 95966 aafde0 95963->95966 95964 abea0c ___std_exception_copy 21 API calls 95964->95966 95965 aafdfa 95965->95937 95966->95964 95966->95965 95969 aafdfc 95966->95969 95985 ab4ead 7 API calls 2 library calls 95966->95985 95968 ab066d 95987 ab32a4 RaiseException 95968->95987 95969->95968 95986 ab32a4 RaiseException 95969->95986 95971 ab068a 95971->95937 95979 ac3820 BuildCatchObjectHelperInternal 95973->95979 95974 ac385e 95984 abf2d9 20 API calls _abort 95974->95984 95976 ac3849 RtlAllocateHeap 95977 ac385c 95976->95977 95976->95979 95977->95956 95979->95974 95979->95976 95983 ab4ead 7 API calls 2 library calls 95979->95983 95980->95956 95981->95962 95982->95960 95983->95979 95984->95977 95985->95966 95986->95968 95987->95971 95988->95948 95990 a993c0 95989->95990 95992 a993c9 __fread_nolock 95989->95992 95990->95992 95993 a9aec9 95990->95993 95992->95942 95994 a9aed9 __fread_nolock 95993->95994 95995 a9aedc 95993->95995 95994->95992 95996 aafddb 22 API calls 95995->95996 95997 a9aee7 95996->95997 95998 aafe0b 22 API calls 95997->95998 95998->95994 96000 a93a67 GetModuleFileNameW 95999->96000 96000->95885 96002 ad1f50 __wsopen_s 96001->96002 96003 a93aaf GetFullPathNameW 96002->96003 96004 a93ae9 96003->96004 96005 a93ace 96003->96005 96015 a9a6c3 96004->96015 96006 a96b57 22 API calls 96005->96006 96008 a93ada 96006->96008 96011 a937a0 96008->96011 96012 a937ae 96011->96012 96013 a993b2 22 API calls 96012->96013 96014 a937c2 96013->96014 96014->95888 96016 a9a6dd 96015->96016 96020 a9a6d0 96015->96020 96017 aafddb 22 API calls 96016->96017 96018 a9a6e7 96017->96018 96019 aafe0b 22 API calls 96018->96019 96019->96020 96020->96008 96022 a933fe _wcslen 96021->96022 96023 ad311d 96022->96023 96024 a93411 96022->96024 96026 aafddb 22 API calls 96023->96026 96031 a9a587 96024->96031 96027 ad3127 96026->96027 96029 aafe0b 22 API calls 96027->96029 96028 a9341e __fread_nolock 96028->95900 96030 ad3157 __fread_nolock 96029->96030 96032 a9a59d 96031->96032 96035 a9a598 __fread_nolock 96031->96035 96033 adf80f 96032->96033 96034 aafe0b 22 API calls 96032->96034 96034->96035 96035->96028 96036 a92de3 96037 a92df0 __wsopen_s 96036->96037 96038 a92e09 96037->96038 96039 ad2c2b ___scrt_fastfail 96037->96039 96040 a93aa2 23 API calls 96038->96040 96041 ad2c47 GetOpenFileNameW 96039->96041 96042 a92e12 96040->96042 96043 ad2c96 96041->96043 96052 a92da5 96042->96052 96045 a96b57 22 API calls 96043->96045 96047 ad2cab 96045->96047 96047->96047 96049 a92e27 96070 a944a8 96049->96070 96053 ad1f50 __wsopen_s 96052->96053 96054 a92db2 GetLongPathNameW 96053->96054 96055 a96b57 22 API calls 96054->96055 96056 a92dda 96055->96056 96057 a93598 96056->96057 96099 a9a961 96057->96099 96060 a93aa2 23 API calls 96061 a935b5 96060->96061 96062 ad32eb 96061->96062 96063 a935c0 96061->96063 96067 ad330d 96062->96067 96116 aace60 41 API calls 96062->96116 96104 a9515f 96063->96104 96069 a935df 96069->96049 96117 a94ecb 96070->96117 96073 ad3833 96139 b02cf9 96073->96139 96074 a94ecb 94 API calls 96076 a944e1 96074->96076 96076->96073 96078 a944e9 96076->96078 96077 ad3848 96079 ad384c 96077->96079 96080 ad3869 96077->96080 96082 ad3854 96078->96082 96083 a944f5 96078->96083 96166 a94f39 96079->96166 96081 aafe0b 22 API calls 96080->96081 96098 ad38ae 96081->96098 96172 afda5a 82 API calls 96082->96172 96165 a9940c 136 API calls 2 library calls 96083->96165 96087 ad3862 96087->96080 96088 a92e31 96089 a94f39 68 API calls 96092 ad3a5f 96089->96092 96092->96089 96178 af989b 82 API calls __wsopen_s 96092->96178 96095 a99cb3 22 API calls 96095->96098 96098->96092 96098->96095 96173 af967e 22 API calls __fread_nolock 96098->96173 96174 af95ad 42 API calls _wcslen 96098->96174 96175 b00b5a 22 API calls 96098->96175 96176 a9a4a1 22 API calls __fread_nolock 96098->96176 96177 a93ff7 22 API calls 96098->96177 96100 aafe0b 22 API calls 96099->96100 96101 a9a976 96100->96101 96102 aafddb 22 API calls 96101->96102 96103 a935aa 96102->96103 96103->96060 96105 a9516e 96104->96105 96109 a9518f __fread_nolock 96104->96109 96107 aafe0b 22 API calls 96105->96107 96106 aafddb 22 API calls 96108 a935cc 96106->96108 96107->96109 96110 a935f3 96108->96110 96109->96106 96111 a93605 96110->96111 96115 a93624 __fread_nolock 96110->96115 96113 aafe0b 22 API calls 96111->96113 96112 aafddb 22 API calls 96114 a9363b 96112->96114 96113->96115 96114->96069 96115->96112 96116->96062 96179 a94e90 LoadLibraryA 96117->96179 96122 ad3ccf 96125 a94f39 68 API calls 96122->96125 96123 a94ef6 LoadLibraryExW 96187 a94e59 LoadLibraryA 96123->96187 96127 ad3cd6 96125->96127 96129 a94e59 3 API calls 96127->96129 96132 ad3cde 96129->96132 96130 a94f20 96131 a94f2c 96130->96131 96130->96132 96134 a94f39 68 API calls 96131->96134 96209 a950f5 40 API calls __fread_nolock 96132->96209 96136 a944cd 96134->96136 96135 ad3cf5 96210 b028fe 27 API calls 96135->96210 96136->96073 96136->96074 96138 ad3d05 96140 b02d15 96139->96140 96293 a9511f 64 API calls 96140->96293 96142 b02d29 96294 b02e66 75 API calls 96142->96294 96144 b02d3b 96162 b02d3f 96144->96162 96295 a950f5 40 API calls __fread_nolock 96144->96295 96146 b02d56 96296 a950f5 40 API calls __fread_nolock 96146->96296 96148 b02d66 96297 a950f5 40 API calls __fread_nolock 96148->96297 96150 b02d81 96298 a950f5 40 API calls __fread_nolock 96150->96298 96152 b02d9c 96299 a9511f 64 API calls 96152->96299 96154 b02db3 96155 abea0c ___std_exception_copy 21 API calls 96154->96155 96156 b02dba 96155->96156 96157 abea0c ___std_exception_copy 21 API calls 96156->96157 96158 b02dc4 96157->96158 96300 a950f5 40 API calls __fread_nolock 96158->96300 96160 b02dd8 96301 b028fe 27 API calls 96160->96301 96162->96077 96163 b02dee 96163->96162 96302 b022ce 96163->96302 96165->96088 96167 a94f4a 96166->96167 96168 a94f43 96166->96168 96170 a94f59 96167->96170 96171 a94f6a FreeLibrary 96167->96171 96169 abe678 67 API calls 96168->96169 96169->96167 96170->96082 96171->96170 96172->96087 96173->96098 96174->96098 96175->96098 96176->96098 96177->96098 96178->96092 96180 a94ea8 GetProcAddress 96179->96180 96181 a94ec6 96179->96181 96182 a94eb8 96180->96182 96184 abe5eb 96181->96184 96182->96181 96183 a94ebf FreeLibrary 96182->96183 96183->96181 96211 abe52a 96184->96211 96186 a94eea 96186->96122 96186->96123 96188 a94e8d 96187->96188 96189 a94e6e GetProcAddress 96187->96189 96192 a94f80 96188->96192 96190 a94e7e 96189->96190 96190->96188 96191 a94e86 FreeLibrary 96190->96191 96191->96188 96193 aafe0b 22 API calls 96192->96193 96194 a94f95 96193->96194 96279 a95722 96194->96279 96196 a94fa1 __fread_nolock 96197 ad3d1d 96196->96197 96198 a950a5 96196->96198 96208 a94fdc 96196->96208 96290 b0304d 74 API calls 96197->96290 96282 a942a2 CreateStreamOnHGlobal 96198->96282 96201 ad3d22 96291 a9511f 64 API calls 96201->96291 96204 ad3d45 96292 a950f5 40 API calls __fread_nolock 96204->96292 96206 a9506e messages 96206->96130 96208->96201 96208->96206 96288 a950f5 40 API calls __fread_nolock 96208->96288 96289 a9511f 64 API calls 96208->96289 96209->96135 96210->96138 96214 abe536 BuildCatchObjectHelperInternal 96211->96214 96212 abe544 96236 abf2d9 20 API calls _abort 96212->96236 96214->96212 96216 abe574 96214->96216 96215 abe549 96237 ac27ec 26 API calls __fread_nolock 96215->96237 96218 abe579 96216->96218 96219 abe586 96216->96219 96238 abf2d9 20 API calls _abort 96218->96238 96228 ac8061 96219->96228 96222 abe554 __fread_nolock 96222->96186 96223 abe58f 96224 abe5a2 96223->96224 96225 abe595 96223->96225 96240 abe5d4 LeaveCriticalSection __fread_nolock 96224->96240 96239 abf2d9 20 API calls _abort 96225->96239 96229 ac806d BuildCatchObjectHelperInternal 96228->96229 96241 ac2f5e EnterCriticalSection 96229->96241 96231 ac807b 96242 ac80fb 96231->96242 96235 ac80ac __fread_nolock 96235->96223 96236->96215 96237->96222 96238->96222 96239->96222 96240->96222 96241->96231 96249 ac811e 96242->96249 96243 ac8177 96260 ac4c7d 96243->96260 96248 ac8189 96254 ac8088 96248->96254 96273 ac3405 11 API calls 2 library calls 96248->96273 96249->96243 96249->96249 96249->96254 96258 ab918d EnterCriticalSection 96249->96258 96259 ab91a1 LeaveCriticalSection 96249->96259 96251 ac81a8 96274 ab918d EnterCriticalSection 96251->96274 96255 ac80b7 96254->96255 96278 ac2fa6 LeaveCriticalSection 96255->96278 96257 ac80be 96257->96235 96258->96249 96259->96249 96266 ac4c8a BuildCatchObjectHelperInternal 96260->96266 96261 ac4cca 96276 abf2d9 20 API calls _abort 96261->96276 96262 ac4cb5 RtlAllocateHeap 96264 ac4cc8 96262->96264 96262->96266 96267 ac29c8 96264->96267 96266->96261 96266->96262 96275 ab4ead 7 API calls 2 library calls 96266->96275 96268 ac29fc __dosmaperr 96267->96268 96269 ac29d3 RtlFreeHeap 96267->96269 96268->96248 96269->96268 96270 ac29e8 96269->96270 96277 abf2d9 20 API calls _abort 96270->96277 96272 ac29ee GetLastError 96272->96268 96273->96251 96274->96254 96275->96266 96276->96264 96277->96272 96278->96257 96280 aafddb 22 API calls 96279->96280 96281 a95734 96280->96281 96281->96196 96283 a942bc FindResourceExW 96282->96283 96287 a942d9 96282->96287 96284 ad35ba LoadResource 96283->96284 96283->96287 96285 ad35cf SizeofResource 96284->96285 96284->96287 96286 ad35e3 LockResource 96285->96286 96285->96287 96286->96287 96287->96208 96288->96208 96289->96208 96290->96201 96291->96204 96292->96206 96293->96142 96294->96144 96295->96146 96296->96148 96297->96150 96298->96152 96299->96154 96300->96160 96301->96163 96303 b022e7 96302->96303 96304 b022d9 96302->96304 96306 b0232c 96303->96306 96307 abe5eb 29 API calls 96303->96307 96330 b022f0 96303->96330 96305 abe5eb 29 API calls 96304->96305 96305->96303 96331 b02557 40 API calls __fread_nolock 96306->96331 96308 b02311 96307->96308 96308->96306 96310 b0231a 96308->96310 96310->96330 96339 abe678 96310->96339 96311 b02370 96312 b02395 96311->96312 96316 b02374 96311->96316 96332 b02171 96312->96332 96315 b02381 96319 abe678 67 API calls 96315->96319 96315->96330 96316->96315 96318 abe678 67 API calls 96316->96318 96317 b0239d 96320 b023c3 96317->96320 96321 b023a3 96317->96321 96318->96315 96319->96330 96352 b023f3 74 API calls 96320->96352 96323 b023b0 96321->96323 96324 abe678 67 API calls 96321->96324 96325 abe678 67 API calls 96323->96325 96323->96330 96324->96323 96325->96330 96326 b023ca 96327 b023de 96326->96327 96328 abe678 67 API calls 96326->96328 96329 abe678 67 API calls 96327->96329 96327->96330 96328->96327 96329->96330 96330->96162 96331->96311 96333 abea0c ___std_exception_copy 21 API calls 96332->96333 96334 b0217f 96333->96334 96335 abea0c ___std_exception_copy 21 API calls 96334->96335 96336 b02190 96335->96336 96337 abea0c ___std_exception_copy 21 API calls 96336->96337 96338 b0219c 96337->96338 96338->96317 96340 abe684 BuildCatchObjectHelperInternal 96339->96340 96341 abe6aa 96340->96341 96342 abe695 96340->96342 96351 abe6a5 __fread_nolock 96341->96351 96353 ab918d EnterCriticalSection 96341->96353 96370 abf2d9 20 API calls _abort 96342->96370 96345 abe69a 96371 ac27ec 26 API calls __fread_nolock 96345->96371 96347 abe6c6 96354 abe602 96347->96354 96349 abe6d1 96372 abe6ee LeaveCriticalSection __fread_nolock 96349->96372 96351->96330 96352->96326 96353->96347 96355 abe60f 96354->96355 96356 abe624 96354->96356 96405 abf2d9 20 API calls _abort 96355->96405 96362 abe61f 96356->96362 96373 abdc0b 96356->96373 96358 abe614 96406 ac27ec 26 API calls __fread_nolock 96358->96406 96362->96349 96366 abe646 96390 ac862f 96366->96390 96369 ac29c8 _free 20 API calls 96369->96362 96370->96345 96371->96351 96372->96351 96374 abdc1f 96373->96374 96375 abdc23 96373->96375 96379 ac4d7a 96374->96379 96375->96374 96376 abd955 __fread_nolock 26 API calls 96375->96376 96377 abdc43 96376->96377 96407 ac59be 62 API calls 4 library calls 96377->96407 96380 abe640 96379->96380 96381 ac4d90 96379->96381 96383 abd955 96380->96383 96381->96380 96382 ac29c8 _free 20 API calls 96381->96382 96382->96380 96384 abd961 96383->96384 96385 abd976 96383->96385 96408 abf2d9 20 API calls _abort 96384->96408 96385->96366 96387 abd966 96409 ac27ec 26 API calls __fread_nolock 96387->96409 96389 abd971 96389->96366 96391 ac863e 96390->96391 96395 ac8653 96390->96395 96413 abf2c6 20 API calls _abort 96391->96413 96393 ac868e 96415 abf2c6 20 API calls _abort 96393->96415 96394 ac8643 96414 abf2d9 20 API calls _abort 96394->96414 96395->96393 96399 ac867a 96395->96399 96397 ac8693 96416 abf2d9 20 API calls _abort 96397->96416 96410 ac8607 96399->96410 96402 ac869b 96417 ac27ec 26 API calls __fread_nolock 96402->96417 96403 abe64c 96403->96362 96403->96369 96405->96358 96406->96362 96407->96374 96408->96387 96409->96389 96418 ac8585 96410->96418 96412 ac862b 96412->96403 96413->96394 96414->96403 96415->96397 96416->96402 96417->96403 96419 ac8591 BuildCatchObjectHelperInternal 96418->96419 96429 ac5147 EnterCriticalSection 96419->96429 96421 ac859f 96422 ac85c6 96421->96422 96423 ac85d1 96421->96423 96430 ac86ae 96422->96430 96445 abf2d9 20 API calls _abort 96423->96445 96426 ac85cc 96446 ac85fb LeaveCriticalSection __wsopen_s 96426->96446 96428 ac85ee __fread_nolock 96428->96412 96429->96421 96447 ac53c4 96430->96447 96432 ac86be 96433 ac86c4 96432->96433 96435 ac86f6 96432->96435 96436 ac53c4 __wsopen_s 26 API calls 96432->96436 96460 ac5333 21 API calls 2 library calls 96433->96460 96435->96433 96437 ac53c4 __wsopen_s 26 API calls 96435->96437 96439 ac86ed 96436->96439 96440 ac8702 CloseHandle 96437->96440 96438 ac871c 96441 ac873e 96438->96441 96461 abf2a3 20 API calls __dosmaperr 96438->96461 96442 ac53c4 __wsopen_s 26 API calls 96439->96442 96440->96433 96443 ac870e GetLastError 96440->96443 96441->96426 96442->96435 96443->96433 96445->96426 96446->96428 96448 ac53e6 96447->96448 96449 ac53d1 96447->96449 96452 abf2c6 __dosmaperr 20 API calls 96448->96452 96454 ac540b 96448->96454 96450 abf2c6 __dosmaperr 20 API calls 96449->96450 96451 ac53d6 96450->96451 96453 abf2d9 __dosmaperr 20 API calls 96451->96453 96455 ac5416 96452->96455 96456 ac53de 96453->96456 96454->96432 96457 abf2d9 __dosmaperr 20 API calls 96455->96457 96456->96432 96458 ac541e 96457->96458 96459 ac27ec __fread_nolock 26 API calls 96458->96459 96459->96456 96460->96438 96461->96441 96462 a9dee5 96465 a9b710 96462->96465 96466 a9b72b 96465->96466 96467 ae00f8 96466->96467 96468 ae0146 96466->96468 96489 a9b750 96466->96489 96471 ae0102 96467->96471 96474 ae010f 96467->96474 96467->96489 96544 b158a2 348 API calls 2 library calls 96468->96544 96542 b15d33 348 API calls 96471->96542 96492 a9ba20 96474->96492 96543 b161d0 348 API calls 2 library calls 96474->96543 96477 ae03d9 96477->96477 96481 a9ba4e 96482 ae0322 96557 b15c0c 82 API calls 96482->96557 96489->96481 96489->96482 96490 a9bbe0 40 API calls 96489->96490 96491 aad336 40 API calls 96489->96491 96489->96492 96496 a9ec40 96489->96496 96520 aaa01b 96489->96520 96534 a9a81b 41 API calls 96489->96534 96535 aad2f0 40 API calls 96489->96535 96536 ab0242 5 API calls __Init_thread_wait 96489->96536 96537 aaedcd 22 API calls 96489->96537 96538 ab00a3 29 API calls __onexit 96489->96538 96539 ab01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96489->96539 96540 aaee53 82 API calls 96489->96540 96541 aae5ca 348 API calls 96489->96541 96545 a9aceb 96489->96545 96555 aef6bf 23 API calls 96489->96555 96556 a9a8c7 22 API calls __fread_nolock 96489->96556 96490->96489 96491->96489 96492->96481 96558 b0359c 82 API calls __wsopen_s 96492->96558 96514 a9ec76 messages 96496->96514 96497 ab00a3 29 API calls pre_c_initialization 96497->96514 96498 a9fef7 96513 a9ed9d messages 96498->96513 96562 a9a8c7 22 API calls __fread_nolock 96498->96562 96501 aafddb 22 API calls 96501->96514 96502 ae4600 96502->96513 96561 a9a8c7 22 API calls __fread_nolock 96502->96561 96503 ae4b0b 96564 b0359c 82 API calls __wsopen_s 96503->96564 96507 a9a8c7 22 API calls 96507->96514 96510 ab0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96510->96514 96511 a9fbe3 96511->96513 96515 ae4bdc 96511->96515 96519 a9f3ae messages 96511->96519 96512 a9a961 22 API calls 96512->96514 96513->96489 96514->96497 96514->96498 96514->96501 96514->96502 96514->96503 96514->96507 96514->96510 96514->96511 96514->96512 96514->96513 96517 ae4beb 96514->96517 96518 ab01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96514->96518 96514->96519 96559 aa01e0 348 API calls 2 library calls 96514->96559 96560 aa06a0 41 API calls messages 96514->96560 96565 b0359c 82 API calls __wsopen_s 96515->96565 96566 b0359c 82 API calls __wsopen_s 96517->96566 96518->96514 96519->96513 96563 b0359c 82 API calls __wsopen_s 96519->96563 96521 aaa11a 96520->96521 96526 aaa060 96520->96526 96567 a963eb 22 API calls 96521->96567 96523 a9ec40 348 API calls 96523->96526 96524 aaa186 96569 aaa836 22 API calls 96524->96569 96526->96521 96526->96523 96526->96524 96527 aaa16b 96526->96527 96533 a9b567 39 API calls 96526->96533 96532 aaa175 96527->96532 96570 b0359c 82 API calls __wsopen_s 96527->96570 96529 ae7908 96531 aaa124 96531->96527 96568 a96a50 22 API calls 96531->96568 96532->96489 96533->96526 96534->96489 96535->96489 96536->96489 96537->96489 96538->96489 96539->96489 96540->96489 96541->96489 96542->96474 96543->96492 96544->96489 96546 a9acf9 96545->96546 96554 a9ad2a messages 96545->96554 96547 a9ad55 96546->96547 96549 a9ad01 messages 96546->96549 96547->96554 96571 a9a8c7 22 API calls __fread_nolock 96547->96571 96550 adfa48 96549->96550 96551 a9ad21 96549->96551 96549->96554 96550->96554 96572 aace17 22 API calls messages 96550->96572 96552 adfa3a VariantClear 96551->96552 96551->96554 96552->96554 96554->96489 96555->96489 96556->96489 96557->96492 96558->96477 96559->96514 96560->96514 96561->96513 96562->96513 96563->96513 96564->96513 96565->96517 96566->96513 96567->96531 96568->96527 96569->96532 96570->96529 96571->96554 96572->96554 96573 a91044 96578 a910f3 96573->96578 96575 a9104a 96614 ab00a3 29 API calls __onexit 96575->96614 96577 a91054 96615 a91398 96578->96615 96582 a9116a 96583 a9a961 22 API calls 96582->96583 96584 a91174 96583->96584 96585 a9a961 22 API calls 96584->96585 96586 a9117e 96585->96586 96587 a9a961 22 API calls 96586->96587 96588 a91188 96587->96588 96589 a9a961 22 API calls 96588->96589 96590 a911c6 96589->96590 96591 a9a961 22 API calls 96590->96591 96592 a91292 96591->96592 96625 a9171c 96592->96625 96596 a912c4 96597 a9a961 22 API calls 96596->96597 96598 a912ce 96597->96598 96646 aa1940 96598->96646 96600 a912f9 96656 a91aab 96600->96656 96602 a91315 96603 a91325 GetStdHandle 96602->96603 96604 a9137a 96603->96604 96605 ad2485 96603->96605 96608 a91387 OleInitialize 96604->96608 96605->96604 96606 ad248e 96605->96606 96607 aafddb 22 API calls 96606->96607 96609 ad2495 96607->96609 96608->96575 96663 b0011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96609->96663 96611 ad249e 96664 b00944 CreateThread 96611->96664 96613 ad24aa CloseHandle 96613->96604 96614->96577 96665 a913f1 96615->96665 96618 a913f1 22 API calls 96619 a913d0 96618->96619 96620 a9a961 22 API calls 96619->96620 96621 a913dc 96620->96621 96622 a96b57 22 API calls 96621->96622 96623 a91129 96622->96623 96624 a91bc3 6 API calls 96623->96624 96624->96582 96626 a9a961 22 API calls 96625->96626 96627 a9172c 96626->96627 96628 a9a961 22 API calls 96627->96628 96629 a91734 96628->96629 96630 a9a961 22 API calls 96629->96630 96631 a9174f 96630->96631 96632 aafddb 22 API calls 96631->96632 96633 a9129c 96632->96633 96634 a91b4a 96633->96634 96635 a91b58 96634->96635 96636 a9a961 22 API calls 96635->96636 96637 a91b63 96636->96637 96638 a9a961 22 API calls 96637->96638 96639 a91b6e 96638->96639 96640 a9a961 22 API calls 96639->96640 96641 a91b79 96640->96641 96642 a9a961 22 API calls 96641->96642 96643 a91b84 96642->96643 96644 aafddb 22 API calls 96643->96644 96645 a91b96 RegisterWindowMessageW 96644->96645 96645->96596 96647 aa1981 96646->96647 96649 aa195d 96646->96649 96672 ab0242 5 API calls __Init_thread_wait 96647->96672 96648 aa196e 96648->96600 96649->96648 96674 ab0242 5 API calls __Init_thread_wait 96649->96674 96651 aa198b 96651->96649 96673 ab01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96651->96673 96653 aa8727 96653->96648 96675 ab01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96653->96675 96657 ad272d 96656->96657 96658 a91abb 96656->96658 96676 b03209 23 API calls 96657->96676 96660 aafddb 22 API calls 96658->96660 96662 a91ac3 96660->96662 96661 ad2738 96662->96602 96663->96611 96664->96613 96677 b0092a 28 API calls 96664->96677 96666 a9a961 22 API calls 96665->96666 96667 a913fc 96666->96667 96668 a9a961 22 API calls 96667->96668 96669 a91404 96668->96669 96670 a9a961 22 API calls 96669->96670 96671 a913c6 96670->96671 96671->96618 96672->96651 96673->96649 96674->96653 96675->96648 96676->96661 96678 ae2a00 96694 a9d7b0 messages 96678->96694 96679 a9db11 PeekMessageW 96679->96694 96680 a9d807 GetInputState 96680->96679 96680->96694 96682 ae1cbe TranslateAcceleratorW 96682->96694 96683 a9da04 timeGetTime 96683->96694 96684 a9db8f PeekMessageW 96684->96694 96685 a9db73 TranslateMessage DispatchMessageW 96685->96684 96686 a9dbaf Sleep 96686->96694 96687 ae2b74 Sleep 96700 ae2a51 96687->96700 96690 ae1dda timeGetTime 96837 aae300 23 API calls 96690->96837 96693 ae2c0b GetExitCodeProcess 96696 ae2c37 CloseHandle 96693->96696 96697 ae2c21 WaitForSingleObject 96693->96697 96694->96679 96694->96680 96694->96682 96694->96683 96694->96684 96694->96685 96694->96686 96694->96687 96694->96690 96698 a9d9d5 96694->96698 96694->96700 96706 a9ec40 348 API calls 96694->96706 96710 a9dd50 96694->96710 96717 aa1310 96694->96717 96772 a9bf40 96694->96772 96830 aaedf6 96694->96830 96835 a9dfd0 348 API calls 3 library calls 96694->96835 96836 aae551 timeGetTime 96694->96836 96838 b03a2a 23 API calls 96694->96838 96839 b0359c 82 API calls __wsopen_s 96694->96839 96696->96700 96697->96694 96697->96696 96699 b229bf GetForegroundWindow 96699->96700 96700->96693 96700->96694 96700->96698 96700->96699 96701 ae2ca9 Sleep 96700->96701 96840 b15658 23 API calls 96700->96840 96841 afe97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96700->96841 96842 aae551 timeGetTime 96700->96842 96843 afd4dc CreateToolhelp32Snapshot Process32FirstW 96700->96843 96701->96694 96706->96694 96711 a9dd6f 96710->96711 96712 a9dd83 96710->96712 96853 a9d260 96711->96853 96885 b0359c 82 API calls __wsopen_s 96712->96885 96714 a9dd7a 96714->96694 96716 ae2f75 96716->96716 96718 aa17b0 96717->96718 96719 aa1376 96717->96719 96924 ab0242 5 API calls __Init_thread_wait 96718->96924 96720 aa1390 96719->96720 96721 ae6331 96719->96721 96724 aa1940 9 API calls 96720->96724 96725 ae633d 96721->96725 96928 b1709c 348 API calls 96721->96928 96723 aa17ba 96727 aa17fb 96723->96727 96729 a99cb3 22 API calls 96723->96729 96728 aa13a0 96724->96728 96725->96694 96732 ae6346 96727->96732 96734 aa182c 96727->96734 96730 aa1940 9 API calls 96728->96730 96738 aa17d4 96729->96738 96731 aa13b6 96730->96731 96731->96727 96733 aa13ec 96731->96733 96929 b0359c 82 API calls __wsopen_s 96732->96929 96733->96732 96758 aa1408 __fread_nolock 96733->96758 96736 a9aceb 23 API calls 96734->96736 96737 aa1839 96736->96737 96926 aad217 348 API calls 96737->96926 96925 ab01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96738->96925 96741 ae636e 96930 b0359c 82 API calls __wsopen_s 96741->96930 96742 aa152f 96744 aa153c 96742->96744 96745 ae63d1 96742->96745 96747 aa1940 9 API calls 96744->96747 96932 b15745 54 API calls _wcslen 96745->96932 96749 aa1549 96747->96749 96748 aafddb 22 API calls 96748->96758 96754 aa1940 9 API calls 96749->96754 96756 aa15c7 messages 96749->96756 96750 aa1872 96927 aafaeb 23 API calls 96750->96927 96751 aafe0b 22 API calls 96751->96758 96752 aa171d 96752->96694 96759 aa1563 96754->96759 96756->96750 96760 aa167b messages 96756->96760 96763 aa1940 9 API calls 96756->96763 96895 b05c5a 96756->96895 96900 b1a2ea 96756->96900 96905 b1abf7 96756->96905 96910 aaf645 96756->96910 96917 b1ab67 96756->96917 96920 b21591 96756->96920 96934 b0359c 82 API calls __wsopen_s 96756->96934 96757 a9ec40 348 API calls 96757->96758 96758->96737 96758->96741 96758->96742 96758->96748 96758->96751 96758->96756 96758->96757 96761 ae63b2 96758->96761 96759->96756 96933 a9a8c7 22 API calls __fread_nolock 96759->96933 96760->96752 96923 aace17 22 API calls messages 96760->96923 96931 b0359c 82 API calls __wsopen_s 96761->96931 96763->96756 97106 a9adf0 96772->97106 96774 a9bf9d 96775 a9bfa9 96774->96775 96776 ae04b6 96774->96776 96778 ae04c6 96775->96778 96779 a9c01e 96775->96779 97124 b0359c 82 API calls __wsopen_s 96776->97124 97125 b0359c 82 API calls __wsopen_s 96778->97125 97111 a9ac91 96779->97111 96782 ae04f5 96786 ae055a 96782->96786 97126 aad217 348 API calls 96782->97126 96784 af7120 22 API calls 96827 a9c039 __fread_nolock messages 96784->96827 96785 a9c7da 96789 aafe0b 22 API calls 96785->96789 96814 a9c603 96786->96814 97127 b0359c 82 API calls __wsopen_s 96786->97127 96793 a9c808 __fread_nolock 96789->96793 96794 aafe0b 22 API calls 96793->96794 96828 a9c350 __fread_nolock messages 96794->96828 96795 a9af8a 22 API calls 96795->96827 96796 ae091a 97136 b03209 23 API calls 96796->97136 96799 a9ec40 348 API calls 96799->96827 96800 ae08a5 96801 a9ec40 348 API calls 96800->96801 96802 ae08cf 96801->96802 96802->96814 97134 a9a81b 41 API calls 96802->97134 96804 ae0591 97128 b0359c 82 API calls __wsopen_s 96804->97128 96808 ae08f6 97135 b0359c 82 API calls __wsopen_s 96808->97135 96810 a9c237 96812 a9c253 96810->96812 97137 a9a8c7 22 API calls __fread_nolock 96810->97137 96811 a9aceb 23 API calls 96811->96827 96818 ae0976 96812->96818 96820 a9c297 messages 96812->96820 96814->96694 96815 aafe0b 22 API calls 96815->96827 96816 aafddb 22 API calls 96816->96827 96819 a9aceb 23 API calls 96818->96819 96822 ae09bf 96819->96822 96821 a9aceb 23 API calls 96820->96821 96820->96822 96823 a9c335 96821->96823 96822->96814 97138 b0359c 82 API calls __wsopen_s 96822->97138 96823->96822 96824 a9c342 96823->96824 97122 a9a704 22 API calls messages 96824->97122 96825 a9bbe0 40 API calls 96825->96827 96827->96782 96827->96784 96827->96785 96827->96786 96827->96793 96827->96795 96827->96796 96827->96799 96827->96800 96827->96804 96827->96808 96827->96810 96827->96811 96827->96814 96827->96815 96827->96816 96827->96822 96827->96825 97115 a9ad81 96827->97115 97129 af7099 22 API calls __fread_nolock 96827->97129 97130 b15745 54 API calls _wcslen 96827->97130 97131 aaaa42 22 API calls messages 96827->97131 97132 aff05c 40 API calls 96827->97132 97133 a9a993 41 API calls 96827->97133 96829 a9c3ac 96828->96829 97123 aace17 22 API calls messages 96828->97123 96829->96694 96831 aaee09 96830->96831 96832 aaee12 96830->96832 96831->96694 96832->96831 96833 aaee36 IsDialogMessageW 96832->96833 96834 aeefaf GetClassLongW 96832->96834 96833->96831 96833->96832 96834->96832 96834->96833 96835->96694 96836->96694 96837->96694 96838->96694 96839->96694 96840->96700 96841->96700 96842->96700 97148 afdef7 96843->97148 96845 afd5db CloseHandle 96845->96700 96846 afd529 Process32NextW 96846->96845 96852 afd522 96846->96852 96847 a9a961 22 API calls 96847->96852 96848 a99cb3 22 API calls 96848->96852 96852->96845 96852->96846 96852->96847 96852->96848 97154 a9525f 22 API calls 96852->97154 97155 a96350 22 API calls 96852->97155 97156 aace60 41 API calls 96852->97156 96854 a9ec40 348 API calls 96853->96854 96872 a9d29d 96854->96872 96855 ae1bc4 96894 b0359c 82 API calls __wsopen_s 96855->96894 96857 a9d30b messages 96857->96714 96858 a9d6d5 96858->96857 96867 aafe0b 22 API calls 96858->96867 96859 a9d3c3 96859->96858 96861 a9d3ce 96859->96861 96860 a9d5ff 96863 ae1bb5 96860->96863 96864 a9d614 96860->96864 96862 aafddb 22 API calls 96861->96862 96874 a9d3d5 __fread_nolock 96862->96874 96893 b15705 23 API calls 96863->96893 96869 aafddb 22 API calls 96864->96869 96865 a9d4b8 96870 aafe0b 22 API calls 96865->96870 96866 aafddb 22 API calls 96866->96872 96867->96874 96878 a9d46a 96869->96878 96880 a9d429 __fread_nolock messages 96870->96880 96871 aafddb 22 API calls 96873 a9d3f6 96871->96873 96872->96855 96872->96857 96872->96858 96872->96859 96872->96865 96872->96866 96872->96880 96873->96880 96886 a9bec0 348 API calls 96873->96886 96874->96871 96874->96873 96876 ae1ba4 96892 b0359c 82 API calls __wsopen_s 96876->96892 96878->96714 96880->96860 96880->96876 96880->96878 96881 ae1b7f 96880->96881 96883 ae1b5d 96880->96883 96887 a91f6f 96880->96887 96891 b0359c 82 API calls __wsopen_s 96881->96891 96890 b0359c 82 API calls __wsopen_s 96883->96890 96885->96716 96886->96880 96888 a9ec40 348 API calls 96887->96888 96889 a91f98 96888->96889 96889->96880 96890->96878 96891->96878 96892->96878 96893->96855 96894->96857 96935 a97510 96895->96935 96899 b05c77 96899->96756 96901 a97510 53 API calls 96900->96901 96902 b1a306 96901->96902 96903 afd4dc 47 API calls 96902->96903 96904 b1a315 96903->96904 96904->96756 96967 b1aff9 96905->96967 96907 b1ac0c 96908 b1ac54 96907->96908 96909 a9aceb 23 API calls 96907->96909 96908->96756 96909->96908 96911 a9b567 39 API calls 96910->96911 96912 aaf659 96911->96912 96913 aef2dc Sleep 96912->96913 96914 aaf661 timeGetTime 96912->96914 96915 a9b567 39 API calls 96914->96915 96916 aaf677 96915->96916 96916->96756 96918 b1aff9 217 API calls 96917->96918 96919 b1ab79 96918->96919 96919->96756 97095 b22ad8 96920->97095 96922 b2159f 96922->96756 96923->96760 96924->96723 96925->96727 96926->96750 96927->96750 96928->96725 96929->96756 96930->96756 96931->96756 96932->96759 96933->96756 96934->96756 96936 a97525 96935->96936 96952 a97522 96935->96952 96937 a9755b 96936->96937 96938 a9752d 96936->96938 96940 ad50f6 96937->96940 96943 ad500f 96937->96943 96944 a9756d 96937->96944 96963 ab51c6 26 API calls 96938->96963 96966 ab5183 26 API calls 96940->96966 96941 a9753d 96948 aafddb 22 API calls 96941->96948 96951 aafe0b 22 API calls 96943->96951 96957 ad5088 96943->96957 96964 aafb21 51 API calls 96944->96964 96945 ad510e 96945->96945 96949 a97547 96948->96949 96950 a99cb3 22 API calls 96949->96950 96950->96952 96953 ad5058 96951->96953 96958 afdbbe lstrlenW 96952->96958 96954 aafddb 22 API calls 96953->96954 96955 ad507f 96954->96955 96956 a99cb3 22 API calls 96955->96956 96956->96957 96965 aafb21 51 API calls 96957->96965 96959 afdbdc GetFileAttributesW 96958->96959 96960 afdc06 96958->96960 96959->96960 96961 afdbe8 FindFirstFileW 96959->96961 96960->96899 96961->96960 96962 afdbf9 FindClose 96961->96962 96962->96960 96963->96941 96964->96941 96965->96940 96966->96945 96968 b1b01d ___scrt_fastfail 96967->96968 96969 b1b094 96968->96969 96970 b1b058 96968->96970 96974 a9b567 39 API calls 96969->96974 96975 b1b08b 96969->96975 97065 a9b567 96970->97065 96972 b1b063 96972->96975 96979 a9b567 39 API calls 96972->96979 96973 b1b0ed 96976 a97510 53 API calls 96973->96976 96977 b1b0a5 96974->96977 96975->96973 96980 a9b567 39 API calls 96975->96980 96981 b1b10b 96976->96981 96978 a9b567 39 API calls 96977->96978 96978->96975 96983 b1b078 96979->96983 96980->96973 97058 a97620 96981->97058 96985 a9b567 39 API calls 96983->96985 96984 b1b115 96986 b1b1d8 96984->96986 96987 b1b11f 96984->96987 96985->96975 96989 b1b20a GetCurrentDirectoryW 96986->96989 96992 a97510 53 API calls 96986->96992 96988 a97510 53 API calls 96987->96988 96990 b1b130 96988->96990 96991 aafe0b 22 API calls 96989->96991 96993 a97620 22 API calls 96990->96993 96994 b1b22f GetCurrentDirectoryW 96991->96994 96995 b1b1ef 96992->96995 96996 b1b13a 96993->96996 96997 b1b23c 96994->96997 96998 a97620 22 API calls 96995->96998 96999 a97510 53 API calls 96996->96999 97002 b1b275 96997->97002 97070 a99c6e 22 API calls 96997->97070 97000 b1b1f9 _wcslen 96998->97000 97001 b1b14b 96999->97001 97000->96989 97000->97002 97003 a97620 22 API calls 97001->97003 97007 b1b287 97002->97007 97008 b1b28b 97002->97008 97005 b1b155 97003->97005 97009 a97510 53 API calls 97005->97009 97006 b1b255 97071 a99c6e 22 API calls 97006->97071 97015 b1b2f8 97007->97015 97016 b1b39a CreateProcessW 97007->97016 97073 b007c0 10 API calls 97008->97073 97012 b1b166 97009->97012 97017 a97620 22 API calls 97012->97017 97013 b1b265 97072 a99c6e 22 API calls 97013->97072 97014 b1b294 97074 b006e6 10 API calls 97014->97074 97076 af11c8 39 API calls 97015->97076 97057 b1b32f _wcslen 97016->97057 97024 b1b170 97017->97024 97021 b1b2aa 97075 b005a7 8 API calls 97021->97075 97022 b1b2fd 97028 b1b323 97022->97028 97029 b1b32a 97022->97029 97023 b1b1a6 GetSystemDirectoryW 97027 aafe0b 22 API calls 97023->97027 97024->97023 97025 a97510 53 API calls 97024->97025 97030 b1b187 97025->97030 97033 b1b1cb GetSystemDirectoryW 97027->97033 97077 af1201 128 API calls 2 library calls 97028->97077 97078 af14ce 6 API calls 97029->97078 97036 a97620 22 API calls 97030->97036 97032 b1b2d0 97032->97007 97033->96997 97035 b1b328 97035->97057 97037 b1b191 _wcslen 97036->97037 97037->96997 97037->97023 97038 b1b3d6 GetLastError 97047 b1b41a 97038->97047 97039 b1b42f CloseHandle 97040 b1b43f 97039->97040 97048 b1b49a 97039->97048 97041 b1b451 97040->97041 97042 b1b446 CloseHandle 97040->97042 97045 b1b463 97041->97045 97046 b1b458 CloseHandle 97041->97046 97042->97041 97044 b1b4a6 97044->97047 97049 b1b475 97045->97049 97050 b1b46a CloseHandle 97045->97050 97046->97045 97062 b00175 97047->97062 97048->97044 97053 b1b4d2 CloseHandle 97048->97053 97079 b009d9 34 API calls 97049->97079 97050->97049 97053->97047 97055 b1b486 97080 b1b536 25 API calls 97055->97080 97057->97038 97057->97039 97059 a9762a _wcslen 97058->97059 97060 aafe0b 22 API calls 97059->97060 97061 a9763f 97060->97061 97061->96984 97081 b0030f 97062->97081 97066 a9b578 97065->97066 97067 a9b57f 97065->97067 97066->97067 97094 ab62d1 39 API calls _strftime 97066->97094 97067->96972 97069 a9b5c2 97069->96972 97070->97006 97071->97013 97072->97002 97073->97014 97074->97021 97075->97032 97076->97022 97077->97035 97078->97057 97079->97055 97080->97048 97082 b00321 CloseHandle 97081->97082 97083 b00329 97081->97083 97082->97083 97084 b00336 97083->97084 97085 b0032e CloseHandle 97083->97085 97086 b00343 97084->97086 97087 b0033b CloseHandle 97084->97087 97085->97084 97088 b00350 97086->97088 97089 b00348 CloseHandle 97086->97089 97087->97086 97090 b00355 CloseHandle 97088->97090 97091 b0035d 97088->97091 97089->97088 97090->97091 97092 b00362 CloseHandle 97091->97092 97093 b0017d 97091->97093 97092->97093 97093->96907 97094->97069 97096 a9aceb 23 API calls 97095->97096 97097 b22af3 97096->97097 97098 b22aff 97097->97098 97099 b22b1d 97097->97099 97100 a97510 53 API calls 97098->97100 97101 a96b57 22 API calls 97099->97101 97102 b22b0c 97100->97102 97104 b22b1b 97101->97104 97102->97104 97105 a9a8c7 22 API calls __fread_nolock 97102->97105 97104->96922 97105->97104 97107 a9ae01 97106->97107 97110 a9ae1c messages 97106->97110 97108 a9aec9 22 API calls 97107->97108 97109 a9ae09 CharUpperBuffW 97108->97109 97109->97110 97110->96774 97112 a9acae 97111->97112 97113 a9acd1 97112->97113 97139 b0359c 82 API calls __wsopen_s 97112->97139 97113->96827 97116 adfadb 97115->97116 97117 a9ad92 97115->97117 97118 aafddb 22 API calls 97117->97118 97119 a9ad99 97118->97119 97140 a9adcd 97119->97140 97122->96828 97123->96828 97124->96778 97125->96814 97126->96786 97127->96814 97128->96814 97129->96827 97130->96827 97131->96827 97132->96827 97133->96827 97134->96808 97135->96814 97136->96810 97137->96812 97138->96814 97139->97113 97144 a9addd 97140->97144 97141 a9adb6 97141->96827 97142 aafddb 22 API calls 97142->97144 97143 a9a961 22 API calls 97143->97144 97144->97141 97144->97142 97144->97143 97146 a9adcd 22 API calls 97144->97146 97147 a9a8c7 22 API calls __fread_nolock 97144->97147 97146->97144 97147->97144 97149 afdf02 97148->97149 97150 afdf19 97149->97150 97153 afdf1f 97149->97153 97157 ab63b2 GetStringTypeW _strftime 97149->97157 97158 ab62fb 39 API calls _strftime 97150->97158 97153->96852 97154->96852 97155->96852 97156->96852 97157->97149 97158->97153 97159 ac8402 97164 ac81be 97159->97164 97162 ac842a 97165 ac81ef try_get_first_available_module 97164->97165 97172 ac8338 97165->97172 97179 ab8e0b 40 API calls 2 library calls 97165->97179 97167 ac83ee 97183 ac27ec 26 API calls __fread_nolock 97167->97183 97169 ac8343 97169->97162 97176 ad0984 97169->97176 97171 ac838c 97171->97172 97180 ab8e0b 40 API calls 2 library calls 97171->97180 97172->97169 97182 abf2d9 20 API calls _abort 97172->97182 97174 ac83ab 97174->97172 97181 ab8e0b 40 API calls 2 library calls 97174->97181 97184 ad0081 97176->97184 97178 ad099f 97178->97162 97179->97171 97180->97174 97181->97172 97182->97167 97183->97169 97185 ad008d BuildCatchObjectHelperInternal 97184->97185 97186 ad009b 97185->97186 97189 ad00d4 97185->97189 97242 abf2d9 20 API calls _abort 97186->97242 97188 ad00a0 97243 ac27ec 26 API calls __fread_nolock 97188->97243 97195 ad065b 97189->97195 97194 ad00aa __fread_nolock 97194->97178 97245 ad042f 97195->97245 97198 ad068d 97277 abf2c6 20 API calls _abort 97198->97277 97199 ad06a6 97263 ac5221 97199->97263 97202 ad06ab 97203 ad06cb 97202->97203 97204 ad06b4 97202->97204 97276 ad039a CreateFileW 97203->97276 97279 abf2c6 20 API calls _abort 97204->97279 97208 ad00f8 97244 ad0121 LeaveCriticalSection __wsopen_s 97208->97244 97209 ad06b9 97280 abf2d9 20 API calls _abort 97209->97280 97210 ad0781 GetFileType 97214 ad078c GetLastError 97210->97214 97215 ad07d3 97210->97215 97212 ad0692 97278 abf2d9 20 API calls _abort 97212->97278 97213 ad0756 GetLastError 97282 abf2a3 20 API calls __dosmaperr 97213->97282 97283 abf2a3 20 API calls __dosmaperr 97214->97283 97285 ac516a 21 API calls 2 library calls 97215->97285 97216 ad0704 97216->97210 97216->97213 97281 ad039a CreateFileW 97216->97281 97220 ad079a CloseHandle 97220->97212 97221 ad07c3 97220->97221 97284 abf2d9 20 API calls _abort 97221->97284 97223 ad0749 97223->97210 97223->97213 97225 ad07f4 97227 ad0840 97225->97227 97286 ad05ab 72 API calls 3 library calls 97225->97286 97226 ad07c8 97226->97212 97231 ad086d 97227->97231 97287 ad014d 72 API calls 4 library calls 97227->97287 97230 ad0866 97230->97231 97232 ad087e 97230->97232 97233 ac86ae __wsopen_s 29 API calls 97231->97233 97232->97208 97234 ad08fc CloseHandle 97232->97234 97233->97208 97288 ad039a CreateFileW 97234->97288 97236 ad0927 97237 ad0931 GetLastError 97236->97237 97238 ad095d 97236->97238 97289 abf2a3 20 API calls __dosmaperr 97237->97289 97238->97208 97240 ad093d 97290 ac5333 21 API calls 2 library calls 97240->97290 97242->97188 97243->97194 97244->97194 97246 ad0450 97245->97246 97247 ad046a 97245->97247 97246->97247 97298 abf2d9 20 API calls _abort 97246->97298 97291 ad03bf 97247->97291 97250 ad045f 97299 ac27ec 26 API calls __fread_nolock 97250->97299 97252 ad04a2 97253 ad04d1 97252->97253 97300 abf2d9 20 API calls _abort 97252->97300 97261 ad0524 97253->97261 97302 abd70d 26 API calls 2 library calls 97253->97302 97256 ad051f 97258 ad059e 97256->97258 97256->97261 97257 ad04c6 97301 ac27ec 26 API calls __fread_nolock 97257->97301 97303 ac27fc 11 API calls _abort 97258->97303 97261->97198 97261->97199 97262 ad05aa 97264 ac522d BuildCatchObjectHelperInternal 97263->97264 97306 ac2f5e EnterCriticalSection 97264->97306 97266 ac5234 97267 ac5259 97266->97267 97272 ac52c7 EnterCriticalSection 97266->97272 97274 ac527b 97266->97274 97310 ac5000 97267->97310 97270 ac52a4 __fread_nolock 97270->97202 97273 ac52d4 LeaveCriticalSection 97272->97273 97272->97274 97273->97266 97307 ac532a 97274->97307 97276->97216 97277->97212 97278->97208 97279->97209 97280->97212 97281->97223 97282->97212 97283->97220 97284->97226 97285->97225 97286->97227 97287->97230 97288->97236 97289->97240 97290->97238 97293 ad03d7 97291->97293 97292 ad03f2 97292->97252 97293->97292 97304 abf2d9 20 API calls _abort 97293->97304 97295 ad0416 97305 ac27ec 26 API calls __fread_nolock 97295->97305 97297 ad0421 97297->97252 97298->97250 97299->97247 97300->97257 97301->97253 97302->97256 97303->97262 97304->97295 97305->97297 97306->97266 97318 ac2fa6 LeaveCriticalSection 97307->97318 97309 ac5331 97309->97270 97311 ac4c7d BuildCatchObjectHelperInternal 20 API calls 97310->97311 97312 ac5012 97311->97312 97316 ac501f 97312->97316 97319 ac3405 11 API calls 2 library calls 97312->97319 97313 ac29c8 _free 20 API calls 97315 ac5071 97313->97315 97315->97274 97317 ac5147 EnterCriticalSection 97315->97317 97316->97313 97317->97274 97318->97309 97319->97312 97320 a96a26 97321 aafddb 22 API calls 97320->97321 97322 a96a33 97321->97322 97323 ad2402 97326 a91410 97323->97326 97327 ad24b8 DestroyWindow 97326->97327 97328 a9144f mciSendStringW 97326->97328 97341 ad24c4 97327->97341 97329 a9146b 97328->97329 97330 a916c6 97328->97330 97332 a91479 97329->97332 97329->97341 97330->97329 97331 a916d5 UnregisterHotKey 97330->97331 97331->97330 97359 a9182e 97332->97359 97335 ad2509 97340 ad252d 97335->97340 97342 ad251c FreeLibrary 97335->97342 97336 ad24d8 97336->97341 97365 a96246 CloseHandle 97336->97365 97337 ad24e2 FindClose 97337->97341 97338 a9148e 97338->97340 97347 a9149c 97338->97347 97343 ad2541 VirtualFree 97340->97343 97350 a91509 97340->97350 97341->97335 97341->97336 97341->97337 97342->97335 97343->97340 97344 a914f8 CoUninitialize 97344->97350 97345 ad2589 97353 ad2598 messages 97345->97353 97366 b032eb 6 API calls messages 97345->97366 97346 a91514 97349 a91524 97346->97349 97347->97344 97363 a91944 VirtualFreeEx CloseHandle 97349->97363 97350->97345 97350->97346 97352 a9153a 97352->97353 97356 a9161f 97352->97356 97355 ad2627 97353->97355 97367 af64d4 22 API calls messages 97353->97367 97355->97355 97356->97355 97364 a91876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 97356->97364 97358 a916c1 97361 a9183b 97359->97361 97360 a91480 97360->97335 97360->97338 97361->97360 97368 af702a 22 API calls 97361->97368 97363->97352 97364->97358 97365->97336 97366->97345 97367->97353 97368->97361 97369 ab03fb 97370 ab0407 BuildCatchObjectHelperInternal 97369->97370 97398 aafeb1 97370->97398 97372 ab040e 97373 ab0561 97372->97373 97376 ab0438 97372->97376 97428 ab083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97373->97428 97375 ab0568 97421 ab4e52 97375->97421 97384 ab0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97376->97384 97409 ac247d 97376->97409 97383 ab0457 97386 ab04d8 97384->97386 97424 ab4e1a 38 API calls 3 library calls 97384->97424 97417 ab0959 97386->97417 97389 ab04de 97390 ab04f3 97389->97390 97425 ab0992 GetModuleHandleW 97390->97425 97392 ab04fa 97392->97375 97393 ab04fe 97392->97393 97394 ab0507 97393->97394 97426 ab4df5 28 API calls _abort 97393->97426 97427 ab0040 13 API calls 2 library calls 97394->97427 97397 ab050f 97397->97383 97399 aafeba 97398->97399 97430 ab0698 IsProcessorFeaturePresent 97399->97430 97401 aafec6 97431 ab2c94 10 API calls 3 library calls 97401->97431 97403 aafecb 97404 aafecf 97403->97404 97432 ac2317 97403->97432 97404->97372 97407 aafee6 97407->97372 97412 ac2494 97409->97412 97410 ab0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 97411 ab0451 97410->97411 97411->97383 97413 ac2421 97411->97413 97412->97410 97414 ac2450 97413->97414 97415 ab0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 97414->97415 97416 ac2479 97415->97416 97416->97384 97483 ab2340 97417->97483 97420 ab097f 97420->97389 97485 ab4bcf 97421->97485 97424->97386 97425->97392 97426->97394 97427->97397 97428->97375 97430->97401 97431->97403 97436 acd1f6 97432->97436 97435 ab2cbd 8 API calls 3 library calls 97435->97404 97438 acd20f 97436->97438 97440 acd213 97436->97440 97454 ab0a8c 97438->97454 97439 aafed8 97439->97407 97439->97435 97440->97438 97442 ac4bfb 97440->97442 97443 ac4c07 BuildCatchObjectHelperInternal 97442->97443 97461 ac2f5e EnterCriticalSection 97443->97461 97445 ac4c0e 97462 ac50af 97445->97462 97447 ac4c1d 97448 ac4c2c 97447->97448 97475 ac4a8f 29 API calls 97447->97475 97477 ac4c48 LeaveCriticalSection _abort 97448->97477 97451 ac4c27 97476 ac4b45 GetStdHandle GetFileType 97451->97476 97452 ac4c3d __fread_nolock 97452->97440 97455 ab0a97 IsProcessorFeaturePresent 97454->97455 97456 ab0a95 97454->97456 97458 ab0c5d 97455->97458 97456->97439 97482 ab0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97458->97482 97460 ab0d40 97460->97439 97461->97445 97463 ac50bb BuildCatchObjectHelperInternal 97462->97463 97464 ac50df 97463->97464 97465 ac50c8 97463->97465 97478 ac2f5e EnterCriticalSection 97464->97478 97479 abf2d9 20 API calls _abort 97465->97479 97468 ac50cd 97480 ac27ec 26 API calls __fread_nolock 97468->97480 97470 ac50d7 __fread_nolock 97470->97447 97471 ac5117 97481 ac513e LeaveCriticalSection _abort 97471->97481 97473 ac50eb 97473->97471 97474 ac5000 __wsopen_s 21 API calls 97473->97474 97474->97473 97475->97451 97476->97448 97477->97452 97478->97473 97479->97468 97480->97470 97481->97470 97482->97460 97484 ab096c GetStartupInfoW 97483->97484 97484->97420 97486 ab4bdb BuildCatchObjectHelperInternal 97485->97486 97487 ab4be2 97486->97487 97488 ab4bf4 97486->97488 97524 ab4d29 GetModuleHandleW 97487->97524 97509 ac2f5e EnterCriticalSection 97488->97509 97491 ab4be7 97491->97488 97525 ab4d6d GetModuleHandleExW 97491->97525 97492 ab4c99 97513 ab4cd9 97492->97513 97496 ab4c70 97501 ab4c88 97496->97501 97505 ac2421 _abort 5 API calls 97496->97505 97498 ab4ce2 97533 ad1d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 97498->97533 97499 ab4cb6 97516 ab4ce8 97499->97516 97500 ab4bfb 97500->97492 97500->97496 97510 ac21a8 97500->97510 97506 ac2421 _abort 5 API calls 97501->97506 97505->97501 97506->97492 97509->97500 97534 ac1ee1 97510->97534 97553 ac2fa6 LeaveCriticalSection 97513->97553 97515 ab4cb2 97515->97498 97515->97499 97554 ac360c 97516->97554 97519 ab4d16 97522 ab4d6d _abort 8 API calls 97519->97522 97520 ab4cf6 GetPEB 97520->97519 97521 ab4d06 GetCurrentProcess TerminateProcess 97520->97521 97521->97519 97523 ab4d1e ExitProcess 97522->97523 97524->97491 97526 ab4dba 97525->97526 97527 ab4d97 GetProcAddress 97525->97527 97529 ab4dc9 97526->97529 97530 ab4dc0 FreeLibrary 97526->97530 97528 ab4dac 97527->97528 97528->97526 97531 ab0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 97529->97531 97530->97529 97532 ab4bf3 97531->97532 97532->97488 97537 ac1e90 97534->97537 97536 ac1f05 97536->97496 97538 ac1e9c BuildCatchObjectHelperInternal 97537->97538 97545 ac2f5e EnterCriticalSection 97538->97545 97540 ac1eaa 97546 ac1f31 97540->97546 97544 ac1ec8 __fread_nolock 97544->97536 97545->97540 97549 ac1f59 97546->97549 97551 ac1f51 97546->97551 97547 ab0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 97548 ac1eb7 97547->97548 97552 ac1ed5 LeaveCriticalSection _abort 97548->97552 97550 ac29c8 _free 20 API calls 97549->97550 97549->97551 97550->97551 97551->97547 97552->97544 97553->97515 97555 ac3627 97554->97555 97556 ac3631 97554->97556 97558 ab0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 97555->97558 97561 ac2fd7 5 API calls 2 library calls 97556->97561 97560 ab4cf2 97558->97560 97559 ac3648 97559->97555 97560->97519 97560->97520 97561->97559 97562 a91098 97567 a942de 97562->97567 97566 a910a7 97568 a9a961 22 API calls 97567->97568 97569 a942f5 GetVersionExW 97568->97569 97570 a96b57 22 API calls 97569->97570 97571 a94342 97570->97571 97572 a993b2 22 API calls 97571->97572 97584 a94378 97571->97584 97573 a9436c 97572->97573 97574 a937a0 22 API calls 97573->97574 97574->97584 97575 a9441b GetCurrentProcess IsWow64Process 97576 a94437 97575->97576 97577 a9444f LoadLibraryA 97576->97577 97578 ad3824 GetSystemInfo 97576->97578 97579 a9449c GetSystemInfo 97577->97579 97580 a94460 GetProcAddress 97577->97580 97581 a94476 97579->97581 97580->97579 97583 a94470 GetNativeSystemInfo 97580->97583 97585 a9447a FreeLibrary 97581->97585 97586 a9109d 97581->97586 97582 ad37df 97583->97581 97584->97575 97584->97582 97585->97586 97587 ab00a3 29 API calls __onexit 97586->97587 97587->97566 97588 a9105b 97593 a9344d 97588->97593 97590 a9106a 97624 ab00a3 29 API calls __onexit 97590->97624 97592 a91074 97594 a9345d __wsopen_s 97593->97594 97595 a9a961 22 API calls 97594->97595 97596 a93513 97595->97596 97597 a93a5a 24 API calls 97596->97597 97598 a9351c 97597->97598 97625 a93357 97598->97625 97601 a933c6 22 API calls 97602 a93535 97601->97602 97603 a9515f 22 API calls 97602->97603 97604 a93544 97603->97604 97605 a9a961 22 API calls 97604->97605 97606 a9354d 97605->97606 97607 a9a6c3 22 API calls 97606->97607 97608 a93556 RegOpenKeyExW 97607->97608 97609 ad3176 RegQueryValueExW 97608->97609 97613 a93578 97608->97613 97610 ad320c RegCloseKey 97609->97610 97611 ad3193 97609->97611 97610->97613 97623 ad321e _wcslen 97610->97623 97612 aafe0b 22 API calls 97611->97612 97614 ad31ac 97612->97614 97613->97590 97615 a95722 22 API calls 97614->97615 97616 ad31b7 RegQueryValueExW 97615->97616 97617 ad31d4 97616->97617 97620 ad31ee messages 97616->97620 97619 a96b57 22 API calls 97617->97619 97618 a94c6d 22 API calls 97618->97623 97619->97620 97620->97610 97621 a99cb3 22 API calls 97621->97623 97622 a9515f 22 API calls 97622->97623 97623->97613 97623->97618 97623->97621 97623->97622 97624->97592 97626 ad1f50 __wsopen_s 97625->97626 97627 a93364 GetFullPathNameW 97626->97627 97628 a93386 97627->97628 97629 a96b57 22 API calls 97628->97629 97630 a933a4 97629->97630 97630->97601 97631 a9defc 97634 a91d6f 97631->97634 97633 a9df07 97635 a91d8c 97634->97635 97636 a91f6f 348 API calls 97635->97636 97637 a91da6 97636->97637 97638 ad2759 97637->97638 97640 a91e36 97637->97640 97641 a91dc2 97637->97641 97644 b0359c 82 API calls __wsopen_s 97638->97644 97640->97633 97641->97640 97643 a9289a 23 API calls 97641->97643 97643->97640 97644->97640 97645 a9dddc 97646 a9b710 348 API calls 97645->97646 97647 a9ddea 97646->97647 97648 a9f7bf 97649 a9f7d3 97648->97649 97650 a9fcb6 97648->97650 97652 a9fcc2 97649->97652 97653 aafddb 22 API calls 97649->97653 97651 a9aceb 23 API calls 97650->97651 97651->97652 97654 a9aceb 23 API calls 97652->97654 97655 a9f7e5 97653->97655 97657 a9fd3d 97654->97657 97655->97652 97656 a9f83e 97655->97656 97655->97657 97659 aa1310 348 API calls 97656->97659 97681 a9ed9d messages 97656->97681 97685 b01155 22 API calls 97657->97685 97680 a9ec76 messages 97659->97680 97660 aafddb 22 API calls 97660->97680 97661 a9fef7 97661->97681 97687 a9a8c7 22 API calls __fread_nolock 97661->97687 97664 ae4600 97664->97681 97686 a9a8c7 22 API calls __fread_nolock 97664->97686 97665 ae4b0b 97689 b0359c 82 API calls __wsopen_s 97665->97689 97671 a9a8c7 22 API calls 97671->97680 97672 a9fbe3 97674 ae4bdc 97672->97674 97672->97681 97682 a9f3ae messages 97672->97682 97673 a9a961 22 API calls 97673->97680 97690 b0359c 82 API calls __wsopen_s 97674->97690 97676 ab00a3 29 API calls pre_c_initialization 97676->97680 97677 ab0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97677->97680 97678 ae4beb 97691 b0359c 82 API calls __wsopen_s 97678->97691 97679 ab01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97679->97680 97680->97660 97680->97661 97680->97664 97680->97665 97680->97671 97680->97672 97680->97673 97680->97676 97680->97677 97680->97678 97680->97679 97680->97681 97680->97682 97683 aa01e0 348 API calls 2 library calls 97680->97683 97684 aa06a0 41 API calls messages 97680->97684 97682->97681 97688 b0359c 82 API calls __wsopen_s 97682->97688 97683->97680 97684->97680 97685->97681 97686->97681 97687->97681 97688->97681 97689->97681 97690->97678 97691->97681 97692 a91033 97697 a94c91 97692->97697 97696 a91042 97698 a9a961 22 API calls 97697->97698 97699 a94cff 97698->97699 97705 a93af0 97699->97705 97701 a94d9c 97703 a91038 97701->97703 97708 a951f7 22 API calls __fread_nolock 97701->97708 97704 ab00a3 29 API calls __onexit 97703->97704 97704->97696 97709 a93b1c 97705->97709 97708->97701 97710 a93b0f 97709->97710 97711 a93b29 97709->97711 97710->97701 97711->97710 97712 a93b30 RegOpenKeyExW 97711->97712 97712->97710 97713 a93b4a RegQueryValueExW 97712->97713 97714 a93b6b 97713->97714 97715 a93b80 RegCloseKey 97713->97715 97714->97715 97715->97710 97716 a9fe73 97723 aaceb1 97716->97723 97718 a9fe89 97732 aacf92 97718->97732 97720 a9feb3 97744 b0359c 82 API calls __wsopen_s 97720->97744 97722 ae4ab8 97724 aacebf 97723->97724 97725 aaced2 97723->97725 97726 a9aceb 23 API calls 97724->97726 97727 aaced7 97725->97727 97728 aacf05 97725->97728 97731 aacec9 97726->97731 97730 aafddb 22 API calls 97727->97730 97729 a9aceb 23 API calls 97728->97729 97729->97731 97730->97731 97731->97718 97733 a96270 22 API calls 97732->97733 97734 aacfc9 97733->97734 97735 a99cb3 22 API calls 97734->97735 97738 aacffa 97734->97738 97736 aed166 97735->97736 97745 a96350 22 API calls 97736->97745 97738->97720 97739 aed171 97746 aad2f0 40 API calls 97739->97746 97741 aed184 97742 a9aceb 23 API calls 97741->97742 97743 aed188 97741->97743 97742->97743 97743->97743 97744->97722 97745->97739 97746->97741 97747 ae3f75 97748 aaceb1 23 API calls 97747->97748 97749 ae3f8b 97748->97749 97750 ae4006 97749->97750 97758 aae300 23 API calls 97749->97758 97752 a9bf40 348 API calls 97750->97752 97755 ae4052 97752->97755 97753 ae3fe6 97753->97755 97759 b01abf 22 API calls 97753->97759 97756 ae4a88 97755->97756 97760 b0359c 82 API calls __wsopen_s 97755->97760 97758->97753 97759->97750 97760->97756 97761 a92e37 97762 a9a961 22 API calls 97761->97762 97763 a92e4d 97762->97763 97840 a94ae3 97763->97840 97765 a92e6b 97766 a93a5a 24 API calls 97765->97766 97767 a92e7f 97766->97767 97768 a99cb3 22 API calls 97767->97768 97769 a92e8c 97768->97769 97770 a94ecb 94 API calls 97769->97770 97771 a92ea5 97770->97771 97772 a92ead 97771->97772 97773 ad2cb0 97771->97773 97854 a9a8c7 22 API calls __fread_nolock 97772->97854 97774 b02cf9 80 API calls 97773->97774 97775 ad2cc3 97774->97775 97776 ad2ccf 97775->97776 97778 a94f39 68 API calls 97775->97778 97781 a94f39 68 API calls 97776->97781 97778->97776 97779 a92ec3 97855 a96f88 22 API calls 97779->97855 97783 ad2ce5 97781->97783 97782 a92ecf 97784 a99cb3 22 API calls 97782->97784 97872 a93084 22 API calls 97783->97872 97785 a92edc 97784->97785 97856 a9a81b 41 API calls 97785->97856 97787 a92eec 97790 a99cb3 22 API calls 97787->97790 97789 ad2d02 97873 a93084 22 API calls 97789->97873 97791 a92f12 97790->97791 97857 a9a81b 41 API calls 97791->97857 97793 ad2d1e 97795 a93a5a 24 API calls 97793->97795 97796 ad2d44 97795->97796 97874 a93084 22 API calls 97796->97874 97797 a92f21 97800 a9a961 22 API calls 97797->97800 97799 ad2d50 97875 a9a8c7 22 API calls __fread_nolock 97799->97875 97802 a92f3f 97800->97802 97858 a93084 22 API calls 97802->97858 97803 ad2d5e 97876 a93084 22 API calls 97803->97876 97806 a92f4b 97859 ab4a28 40 API calls 3 library calls 97806->97859 97807 ad2d6d 97877 a9a8c7 22 API calls __fread_nolock 97807->97877 97809 a92f59 97809->97783 97810 a92f63 97809->97810 97860 ab4a28 40 API calls 3 library calls 97810->97860 97813 a92f6e 97813->97789 97815 a92f78 97813->97815 97814 ad2d83 97878 a93084 22 API calls 97814->97878 97861 ab4a28 40 API calls 3 library calls 97815->97861 97818 a92f83 97818->97793 97820 a92f8d 97818->97820 97819 ad2d90 97862 ab4a28 40 API calls 3 library calls 97820->97862 97822 a92f98 97823 a92fdc 97822->97823 97863 a93084 22 API calls 97822->97863 97823->97807 97824 a92fe8 97823->97824 97824->97819 97866 a963eb 22 API calls 97824->97866 97827 a92fbf 97864 a9a8c7 22 API calls __fread_nolock 97827->97864 97828 a92ff8 97867 a96a50 22 API calls 97828->97867 97830 a92fcd 97865 a93084 22 API calls 97830->97865 97833 a93006 97868 a970b0 23 API calls 97833->97868 97837 a93021 97838 a93065 97837->97838 97869 a96f88 22 API calls 97837->97869 97870 a970b0 23 API calls 97837->97870 97871 a93084 22 API calls 97837->97871 97841 a94af0 __wsopen_s 97840->97841 97842 a96b57 22 API calls 97841->97842 97843 a94b22 97841->97843 97842->97843 97853 a94b58 97843->97853 97879 a94c6d 97843->97879 97845 a99cb3 22 API calls 97847 a94c52 97845->97847 97846 a99cb3 22 API calls 97846->97853 97848 a9515f 22 API calls 97847->97848 97851 a94c5e 97848->97851 97849 a94c6d 22 API calls 97849->97853 97850 a9515f 22 API calls 97850->97853 97851->97765 97852 a94c29 97852->97845 97852->97851 97853->97846 97853->97849 97853->97850 97853->97852 97854->97779 97855->97782 97856->97787 97857->97797 97858->97806 97859->97809 97860->97813 97861->97818 97862->97822 97863->97827 97864->97830 97865->97823 97866->97828 97867->97833 97868->97837 97869->97837 97870->97837 97871->97837 97872->97789 97873->97793 97874->97799 97875->97803 97876->97807 97877->97814 97878->97819 97880 a9aec9 22 API calls 97879->97880 97881 a94c78 97880->97881 97881->97843 97882 a93156 97885 a93170 97882->97885 97886 a93187 97885->97886 97887 a931eb 97886->97887 97888 a9318c 97886->97888 97889 a931e9 97886->97889 97893 ad2dfb 97887->97893 97894 a931f1 97887->97894 97890 a93199 97888->97890 97891 a93265 PostQuitMessage 97888->97891 97892 a931d0 DefWindowProcW 97889->97892 97896 ad2e7c 97890->97896 97897 a931a4 97890->97897 97898 a9316a 97891->97898 97892->97898 97940 a918e2 10 API calls 97893->97940 97899 a931f8 97894->97899 97900 a9321d SetTimer RegisterWindowMessageW 97894->97900 97943 afbf30 34 API calls ___scrt_fastfail 97896->97943 97902 ad2e68 97897->97902 97903 a931ae 97897->97903 97906 ad2d9c 97899->97906 97907 a93201 KillTimer 97899->97907 97900->97898 97904 a93246 CreatePopupMenu 97900->97904 97901 ad2e1c 97941 aae499 42 API calls 97901->97941 97930 afc161 97902->97930 97911 ad2e4d 97903->97911 97912 a931b9 97903->97912 97904->97898 97914 ad2dd7 MoveWindow 97906->97914 97915 ad2da1 97906->97915 97908 a930f2 Shell_NotifyIconW 97907->97908 97916 a93214 97908->97916 97911->97892 97942 af0ad7 22 API calls 97911->97942 97917 a931c4 97912->97917 97918 a93253 97912->97918 97913 ad2e8e 97913->97892 97913->97898 97914->97898 97919 ad2da7 97915->97919 97920 ad2dc6 SetFocus 97915->97920 97937 a93c50 DeleteObject DestroyWindow 97916->97937 97917->97892 97927 a930f2 Shell_NotifyIconW 97917->97927 97938 a9326f 44 API calls ___scrt_fastfail 97918->97938 97919->97917 97924 ad2db0 97919->97924 97920->97898 97939 a918e2 10 API calls 97924->97939 97925 a93263 97925->97898 97928 ad2e41 97927->97928 97929 a93837 49 API calls 97928->97929 97929->97889 97931 afc179 ___scrt_fastfail 97930->97931 97932 afc276 97930->97932 97933 a93923 24 API calls 97931->97933 97932->97898 97935 afc1a0 97933->97935 97934 afc25f KillTimer SetTimer 97934->97932 97935->97934 97936 afc251 Shell_NotifyIconW 97935->97936 97936->97934 97937->97898 97938->97925 97939->97898 97940->97901 97941->97917 97942->97889 97943->97913

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 389 a942de-a9434d call a9a961 GetVersionExW call a96b57 394 ad3617-ad362a 389->394 395 a94353 389->395 396 ad362b-ad362f 394->396 397 a94355-a94357 395->397 398 ad3631 396->398 399 ad3632-ad363e 396->399 400 a9435d-a943bc call a993b2 call a937a0 397->400 401 ad3656 397->401 398->399 399->396 402 ad3640-ad3642 399->402 417 ad37df-ad37e6 400->417 418 a943c2-a943c4 400->418 405 ad365d-ad3660 401->405 402->397 404 ad3648-ad364f 402->404 404->394 408 ad3651 404->408 409 a9441b-a94435 GetCurrentProcess IsWow64Process 405->409 410 ad3666-ad36a8 405->410 408->401 412 a94494-a9449a 409->412 413 a94437 409->413 410->409 414 ad36ae-ad36b1 410->414 419 a9443d-a94449 412->419 413->419 415 ad36db-ad36e5 414->415 416 ad36b3-ad36bd 414->416 423 ad36f8-ad3702 415->423 424 ad36e7-ad36f3 415->424 420 ad36bf-ad36c5 416->420 421 ad36ca-ad36d6 416->421 425 ad37e8 417->425 426 ad3806-ad3809 417->426 418->405 422 a943ca-a943dd 418->422 427 a9444f-a9445e LoadLibraryA 419->427 428 ad3824-ad3828 GetSystemInfo 419->428 420->409 421->409 429 a943e3-a943e5 422->429 430 ad3726-ad372f 422->430 432 ad3715-ad3721 423->432 433 ad3704-ad3710 423->433 424->409 431 ad37ee 425->431 434 ad380b-ad381a 426->434 435 ad37f4-ad37fc 426->435 436 a9449c-a944a6 GetSystemInfo 427->436 437 a94460-a9446e GetProcAddress 427->437 439 ad374d-ad3762 429->439 440 a943eb-a943ee 429->440 441 ad373c-ad3748 430->441 442 ad3731-ad3737 430->442 431->435 432->409 433->409 434->431 443 ad381c-ad3822 434->443 435->426 438 a94476-a94478 436->438 437->436 444 a94470-a94474 GetNativeSystemInfo 437->444 449 a9447a-a9447b FreeLibrary 438->449 450 a94481-a94493 438->450 447 ad376f-ad377b 439->447 448 ad3764-ad376a 439->448 445 ad3791-ad3794 440->445 446 a943f4-a9440f 440->446 441->409 442->409 443->435 444->438 445->409 451 ad379a-ad37c1 445->451 452 a94415 446->452 453 ad3780-ad378c 446->453 447->409 448->409 449->450 454 ad37ce-ad37da 451->454 455 ad37c3-ad37c9 451->455 452->409 453->409 454->409 455->409
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetVersionExW.KERNEL32(?), ref: 00A9430D
                                                                                                                                                                                                                                                                                • Part of subcall function 00A96B57: _wcslen.LIBCMT ref: 00A96B6A
                                                                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(?,00B2CB64,00000000,?,?), ref: 00A94422
                                                                                                                                                                                                                                                                              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00A94429
                                                                                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00A94454
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00A94466
                                                                                                                                                                                                                                                                              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00A94474
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 00A9447B
                                                                                                                                                                                                                                                                              • GetSystemInfo.KERNEL32(?,?,?), ref: 00A944A0
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                                                              • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                                                              • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                                                              • Opcode ID: 40e0c61ece16e669ea3b14f76d8f069fb38196a32a9d9ee2fade9cb168a77af5
                                                                                                                                                                                                                                                                              • Instruction ID: b1a942ca7ec1160d0739ab7113e1ed9f715afa7eddd6f6b6df480ef855b0d115
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 40e0c61ece16e669ea3b14f76d8f069fb38196a32a9d9ee2fade9cb168a77af5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 16A19376A0A2C0FFCF11CB6D7C855997FE46B7A700B0C8C99D04397BA1DAA84505CB6A

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 793 a942a2-a942ba CreateStreamOnHGlobal 794 a942da-a942dd 793->794 795 a942bc-a942d3 FindResourceExW 793->795 796 a942d9 795->796 797 ad35ba-ad35c9 LoadResource 795->797 796->794 797->796 798 ad35cf-ad35dd SizeofResource 797->798 798->796 799 ad35e3-ad35ee LockResource 798->799 799->796 800 ad35f4-ad3612 799->800 800->796
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00A950AA,?,?,00000000,00000000), ref: 00A942B2
                                                                                                                                                                                                                                                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00A950AA,?,?,00000000,00000000), ref: 00A942C9
                                                                                                                                                                                                                                                                              • LoadResource.KERNEL32(?,00000000,?,?,00A950AA,?,?,00000000,00000000,?,?,?,?,?,?,00A94F20), ref: 00AD35BE
                                                                                                                                                                                                                                                                              • SizeofResource.KERNEL32(?,00000000,?,?,00A950AA,?,?,00000000,00000000,?,?,?,?,?,?,00A94F20), ref: 00AD35D3
                                                                                                                                                                                                                                                                              • LockResource.KERNEL32(00A950AA,?,?,00A950AA,?,?,00000000,00000000,?,?,?,?,?,?,00A94F20,?), ref: 00AD35E6
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                                                              • String ID: SCRIPT
                                                                                                                                                                                                                                                                              • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                                                              • Opcode ID: 50a534b666abd79c8872db53d8fb8ae781831c557adb43d7850858967566a2a9
                                                                                                                                                                                                                                                                              • Instruction ID: c5f9283564f8fba73b15c9b0152a583d3f2efd7164dfd8513bb3deae3f1b983d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 50a534b666abd79c8872db53d8fb8ae781831c557adb43d7850858967566a2a9
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BF113C71200B01BFEB218B65DC49F6B7BF9EFC9B51F248169B40697260DF71D8018A61

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A92B6B
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B61418,?,00A92E7F,?,?,?,00000000), ref: 00A93A78
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • GetForegroundWindow.USER32(runas,?,?,?,?,?,00B52224), ref: 00AD2C10
                                                                                                                                                                                                                                                                              • ShellExecuteW.SHELL32(00000000,?,?,00B52224), ref: 00AD2C17
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                                                                              • String ID: runas
                                                                                                                                                                                                                                                                              • API String ID: 448630720-4000483414
                                                                                                                                                                                                                                                                              • Opcode ID: dfc028b3ca1f14378c1364fb69e3222757b2518e12883fa00b28e0ad52d58367
                                                                                                                                                                                                                                                                              • Instruction ID: 503f899a48dfb4e5ac15aed5ebd0de775946334e1dd5768563e1b227e16ed723
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dfc028b3ca1f14378c1364fb69e3222757b2518e12883fa00b28e0ad52d58367
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DF11D3323083017ACF14FF64DA52ABE7BF49FA1341F48486DF582571A2CF658A4AD712

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00AFD501
                                                                                                                                                                                                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00AFD50F
                                                                                                                                                                                                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00AFD52F
                                                                                                                                                                                                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00AFD5DC
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 420147892-0
                                                                                                                                                                                                                                                                              • Opcode ID: 6b77e50219f9620b37e6b5b0415569e19c2b94acdcb4e32c90b138a955efdc2f
                                                                                                                                                                                                                                                                              • Instruction ID: 0bfd5f621a2508ae51df61a4fb34b88dc7e2facd851c0c5642dca03153658b70
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6b77e50219f9620b37e6b5b0415569e19c2b94acdcb4e32c90b138a955efdc2f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7031AF31108304AFD711EF64C881ABFBBE8EF99354F10092DF585871A1EB719949CB92

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 993 afdbbe-afdbda lstrlenW 994 afdbdc-afdbe6 GetFileAttributesW 993->994 995 afdc06 993->995 996 afdc09-afdc0d 994->996 997 afdbe8-afdbf7 FindFirstFileW 994->997 995->996 997->995 998 afdbf9-afdc04 FindClose 997->998 998->996
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • lstrlenW.KERNEL32(?,00AD5222), ref: 00AFDBCE
                                                                                                                                                                                                                                                                              • GetFileAttributesW.KERNELBASE(?), ref: 00AFDBDD
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00AFDBEE
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00AFDBFA
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2695905019-0
                                                                                                                                                                                                                                                                              • Opcode ID: 15af3d225211ffeda539ef4ed932ecde24456128bd69bd7707b31dbf5ce76384
                                                                                                                                                                                                                                                                              • Instruction ID: 2fc4c2d43092004b2bcad18acd4ebd7a5cd217f546dfabe9d7edbb1c42a96a13
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 15af3d225211ffeda539ef4ed932ecde24456128bd69bd7707b31dbf5ce76384
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 46F0A0308109189782316FB8AC0E8BE3B6D9E01335B104702F976C20E0EFB0595686D5
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00AC28E9,?,00AB4CBE,00AC28E9,00B588B8,0000000C,00AB4E15,00AC28E9,00000002,00000000,?,00AC28E9), ref: 00AB4D09
                                                                                                                                                                                                                                                                              • TerminateProcess.KERNEL32(00000000,?,00AB4CBE,00AC28E9,00B588B8,0000000C,00AB4E15,00AC28E9,00000002,00000000,?,00AC28E9), ref: 00AB4D10
                                                                                                                                                                                                                                                                              • ExitProcess.KERNEL32 ref: 00AB4D22
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1703294689-0
                                                                                                                                                                                                                                                                              • Opcode ID: aeb30e355625a2d5a31b80b90ae38eb9a9efa0565a36a46cab87c6d32c3a776c
                                                                                                                                                                                                                                                                              • Instruction ID: 00d8ab4173430cd306ee85d5393a1b046bf98f1f3f1845ba53620553ad37ff92
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aeb30e355625a2d5a31b80b90ae38eb9a9efa0565a36a46cab87c6d32c3a776c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 75E0B631000548AFCF21AF54DE0AA993F6DEB49795B108418FC059B123CB35DD52DB84

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 0 b1aff9-b1b056 call ab2340 3 b1b094-b1b098 0->3 4 b1b058-b1b06b call a9b567 0->4 6 b1b09a-b1b0bb call a9b567 * 2 3->6 7 b1b0dd-b1b0e0 3->7 12 b1b0c8 4->12 13 b1b06d-b1b092 call a9b567 * 2 4->13 29 b1b0bf-b1b0c4 6->29 9 b1b0e2-b1b0e5 7->9 10 b1b0f5-b1b119 call a97510 call a97620 7->10 14 b1b0e8-b1b0ed call a9b567 9->14 31 b1b1d8-b1b1e0 10->31 32 b1b11f-b1b178 call a97510 call a97620 call a97510 call a97620 call a97510 call a97620 10->32 18 b1b0cb-b1b0cf 12->18 13->29 14->10 24 b1b0d1-b1b0d7 18->24 25 b1b0d9-b1b0db 18->25 24->14 25->7 25->10 29->7 33 b1b0c6 29->33 36 b1b1e2-b1b1fd call a97510 call a97620 31->36 37 b1b20a-b1b238 GetCurrentDirectoryW call aafe0b GetCurrentDirectoryW 31->37 82 b1b1a6-b1b1d6 GetSystemDirectoryW call aafe0b GetSystemDirectoryW 32->82 83 b1b17a-b1b195 call a97510 call a97620 32->83 33->18 36->37 50 b1b1ff-b1b208 call ab4963 36->50 45 b1b23c 37->45 48 b1b240-b1b244 45->48 52 b1b275-b1b285 call b000d9 48->52 53 b1b246-b1b270 call a99c6e * 3 48->53 50->37 50->52 62 b1b287-b1b289 52->62 63 b1b28b-b1b2e1 call b007c0 call b006e6 call b005a7 52->63 53->52 66 b1b2ee-b1b2f2 62->66 63->66 99 b1b2e3 63->99 71 b1b2f8-b1b321 call af11c8 66->71 72 b1b39a-b1b3be CreateProcessW 66->72 88 b1b323-b1b328 call af1201 71->88 89 b1b32a call af14ce 71->89 76 b1b3c1-b1b3d4 call aafe14 * 2 72->76 103 b1b3d6-b1b3e8 76->103 104 b1b42f-b1b43d CloseHandle 76->104 82->45 83->82 105 b1b197-b1b1a0 call ab4963 83->105 98 b1b32f-b1b33c call ab4963 88->98 89->98 113 b1b347-b1b357 call ab4963 98->113 114 b1b33e-b1b345 98->114 99->66 109 b1b3ea 103->109 110 b1b3ed-b1b3fc 103->110 107 b1b49c 104->107 108 b1b43f-b1b444 104->108 105->48 105->82 111 b1b4a0-b1b4a4 107->111 115 b1b451-b1b456 108->115 116 b1b446-b1b44c CloseHandle 108->116 109->110 117 b1b401-b1b42a GetLastError call a9630c call a9cfa0 110->117 118 b1b3fe 110->118 120 b1b4b2-b1b4bc 111->120 121 b1b4a6-b1b4b0 111->121 136 b1b362-b1b372 call ab4963 113->136 137 b1b359-b1b360 113->137 114->113 114->114 124 b1b463-b1b468 115->124 125 b1b458-b1b45e CloseHandle 115->125 116->115 127 b1b4e5-b1b4f6 call b00175 117->127 118->117 128 b1b4c4-b1b4e3 call a9cfa0 CloseHandle 120->128 129 b1b4be 120->129 121->127 131 b1b475-b1b49a call b009d9 call b1b536 124->131 132 b1b46a-b1b470 CloseHandle 124->132 125->124 128->127 129->128 131->111 132->131 147 b1b374-b1b37b 136->147 148 b1b37d-b1b398 call aafe14 * 3 136->148 137->136 137->137 147->147 147->148 148->76
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B1B198
                                                                                                                                                                                                                                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B1B1B0
                                                                                                                                                                                                                                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B1B1D4
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B1B200
                                                                                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B1B214
                                                                                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B1B236
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B1B332
                                                                                                                                                                                                                                                                                • Part of subcall function 00B005A7: GetStdHandle.KERNEL32(000000F6), ref: 00B005C6
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B1B34B
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B1B366
                                                                                                                                                                                                                                                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B1B3B6
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(00000000), ref: 00B1B407
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00B1B439
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00B1B44A
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00B1B45C
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00B1B46E
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00B1B4E3
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2178637699-0
                                                                                                                                                                                                                                                                              • Opcode ID: a5527d8cb44eb7faecfb11cb935256db675c98fdc2504ac979bd1de5e79ecd4f
                                                                                                                                                                                                                                                                              • Instruction ID: 91fbd3efb6530b14b20ffca5cc958a2b9486994c3e9c711b500674b31de75c46
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a5527d8cb44eb7faecfb11cb935256db675c98fdc2504ac979bd1de5e79ecd4f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 79F18C316083409FCB24EF24C991BAEBBE5EF85310F54859DF4999B2A2DB31EC44CB52
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetInputState.USER32 ref: 00A9D807
                                                                                                                                                                                                                                                                              • timeGetTime.WINMM ref: 00A9DA07
                                                                                                                                                                                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A9DB28
                                                                                                                                                                                                                                                                              • TranslateMessage.USER32(?), ref: 00A9DB7B
                                                                                                                                                                                                                                                                              • DispatchMessageW.USER32(?), ref: 00A9DB89
                                                                                                                                                                                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A9DB9F
                                                                                                                                                                                                                                                                              • Sleep.KERNELBASE(0000000A), ref: 00A9DBB1
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2189390790-0
                                                                                                                                                                                                                                                                              • Opcode ID: 1808aacec88783e968c405a2a91d5a971c8efe30b2e2d6f1913a455553bad883
                                                                                                                                                                                                                                                                              • Instruction ID: 43f83cf4f07747678c97cb6cdfd5c310175316ea76a60ec4b806b71dde51c835
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1808aacec88783e968c405a2a91d5a971c8efe30b2e2d6f1913a455553bad883
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FF42D230704681EFDB29DF25C884B6ABBF5BF85304F148A6DE45687291DB74E884CB92

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00A92D07
                                                                                                                                                                                                                                                                              • RegisterClassExW.USER32(00000030), ref: 00A92D31
                                                                                                                                                                                                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A92D42
                                                                                                                                                                                                                                                                              • InitCommonControlsEx.COMCTL32(?), ref: 00A92D5F
                                                                                                                                                                                                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A92D6F
                                                                                                                                                                                                                                                                              • LoadIconW.USER32(000000A9), ref: 00A92D85
                                                                                                                                                                                                                                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A92D94
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                                                              • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                                                              • Opcode ID: b211f303b6c18ffaf1861e57dff96eb70aef936bb812481d321507a4f06d8d9f
                                                                                                                                                                                                                                                                              • Instruction ID: 37ee4c8d3b66073ae24e6f9d9a22e3cbcd1ce49777326d8a996b8b6af7d5a14a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b211f303b6c18ffaf1861e57dff96eb70aef936bb812481d321507a4f06d8d9f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CA21EFB1901218AFDB10DFA8EC89ADEBFB8FB08701F04851AE615A72E0DBB50541CF95

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 457 ad065b-ad068b call ad042f 460 ad068d-ad0698 call abf2c6 457->460 461 ad06a6-ad06b2 call ac5221 457->461 466 ad069a-ad06a1 call abf2d9 460->466 467 ad06cb-ad0714 call ad039a 461->467 468 ad06b4-ad06c9 call abf2c6 call abf2d9 461->468 477 ad097d-ad0983 466->477 475 ad0716-ad071f 467->475 476 ad0781-ad078a GetFileType 467->476 468->466 480 ad0756-ad077c GetLastError call abf2a3 475->480 481 ad0721-ad0725 475->481 482 ad078c-ad07bd GetLastError call abf2a3 CloseHandle 476->482 483 ad07d3-ad07d6 476->483 480->466 481->480 486 ad0727-ad0754 call ad039a 481->486 482->466 494 ad07c3-ad07ce call abf2d9 482->494 484 ad07df-ad07e5 483->484 485 ad07d8-ad07dd 483->485 489 ad07e9-ad0837 call ac516a 484->489 490 ad07e7 484->490 485->489 486->476 486->480 500 ad0839-ad0845 call ad05ab 489->500 501 ad0847-ad086b call ad014d 489->501 490->489 494->466 500->501 508 ad086f-ad0879 call ac86ae 500->508 506 ad086d 501->506 507 ad087e-ad08c1 501->507 506->508 510 ad08c3-ad08c7 507->510 511 ad08e2-ad08f0 507->511 508->477 510->511 513 ad08c9-ad08dd 510->513 514 ad097b 511->514 515 ad08f6-ad08fa 511->515 513->511 514->477 515->514 516 ad08fc-ad092f CloseHandle call ad039a 515->516 519 ad0931-ad095d GetLastError call abf2a3 call ac5333 516->519 520 ad0963-ad0977 516->520 519->520 520->514
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AD039A: CreateFileW.KERNELBASE(00000000,00000000,?,00AD0704,?,?,00000000,?,00AD0704,00000000,0000000C), ref: 00AD03B7
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00AD076F
                                                                                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00AD0776
                                                                                                                                                                                                                                                                              • GetFileType.KERNELBASE(00000000), ref: 00AD0782
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00AD078C
                                                                                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00AD0795
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00AD07B5
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00AD08FF
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00AD0931
                                                                                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00AD0938
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                                                              • String ID: H
                                                                                                                                                                                                                                                                              • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                                                              • Opcode ID: 68c2ff7739357e1a731412dd15982831e259f51a51e9ac604c5dce79b87be7a4
                                                                                                                                                                                                                                                                              • Instruction ID: 4a2fcf9cdbf33476dd44ef63aff9f800f16567cae514e281aca9c7598ccb6817
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 68c2ff7739357e1a731412dd15982831e259f51a51e9ac604c5dce79b87be7a4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4BA10132A101449FDF29EF68D852BEE7BB0AB46320F14015AF8169F392DB759912CB91

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B61418,?,00A92E7F,?,?,?,00000000), ref: 00A93A78
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A93379
                                                                                                                                                                                                                                                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00A9356A
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00AD318D
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00AD31CE
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00AD3210
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AD3277
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AD3286
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                                                              • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                                                              • Opcode ID: f3363385dabb35a3362bc91baf6c9f847e85794f20862e5ba838dc494af432e9
                                                                                                                                                                                                                                                                              • Instruction ID: 9dde7147e224d47127a39e8d75fc0ccf64b8c58b7e73f6b2319bbb82f465a792
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f3363385dabb35a3362bc91baf6c9f847e85794f20862e5ba838dc494af432e9
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EF71B2725047019EDB14EF65DD828AFBBF8FF99340F40042EF545872A0EB749A49CB56

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00A92B8E
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00A92B9D
                                                                                                                                                                                                                                                                              • LoadIconW.USER32(00000063), ref: 00A92BB3
                                                                                                                                                                                                                                                                              • LoadIconW.USER32(000000A4), ref: 00A92BC5
                                                                                                                                                                                                                                                                              • LoadIconW.USER32(000000A2), ref: 00A92BD7
                                                                                                                                                                                                                                                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A92BEF
                                                                                                                                                                                                                                                                              • RegisterClassExW.USER32(?), ref: 00A92C40
                                                                                                                                                                                                                                                                                • Part of subcall function 00A92CD4: GetSysColorBrush.USER32(0000000F), ref: 00A92D07
                                                                                                                                                                                                                                                                                • Part of subcall function 00A92CD4: RegisterClassExW.USER32(00000030), ref: 00A92D31
                                                                                                                                                                                                                                                                                • Part of subcall function 00A92CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A92D42
                                                                                                                                                                                                                                                                                • Part of subcall function 00A92CD4: InitCommonControlsEx.COMCTL32(?), ref: 00A92D5F
                                                                                                                                                                                                                                                                                • Part of subcall function 00A92CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A92D6F
                                                                                                                                                                                                                                                                                • Part of subcall function 00A92CD4: LoadIconW.USER32(000000A9), ref: 00A92D85
                                                                                                                                                                                                                                                                                • Part of subcall function 00A92CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A92D94
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                                                              • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                                                              • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                                                              • Opcode ID: d50b2534045db23d1f3642e8f207a409a5448f1ddbb108e821637dd55d125969
                                                                                                                                                                                                                                                                              • Instruction ID: f6c09fcc4d162336f106a9b024042a867885b26052628f7f17d77da694d0fe81
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d50b2534045db23d1f3642e8f207a409a5448f1ddbb108e821637dd55d125969
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5B212871E10314BBDB10DFA9EC45A9D7FB4FB08B50F08041AE501A77A0DBB909409F98

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 598 a93170-a93185 599 a931e5-a931e7 598->599 600 a93187-a9318a 598->600 599->600 603 a931e9 599->603 601 a931eb 600->601 602 a9318c-a93193 600->602 607 ad2dfb-ad2e23 call a918e2 call aae499 601->607 608 a931f1-a931f6 601->608 604 a93199-a9319e 602->604 605 a93265-a9326d PostQuitMessage 602->605 606 a931d0-a931d8 DefWindowProcW 603->606 610 ad2e7c-ad2e90 call afbf30 604->610 611 a931a4-a931a8 604->611 613 a93219-a9321b 605->613 612 a931de-a931e4 606->612 643 ad2e28-ad2e2f 607->643 614 a931f8-a931fb 608->614 615 a9321d-a93244 SetTimer RegisterWindowMessageW 608->615 610->613 636 ad2e96 610->636 617 ad2e68-ad2e72 call afc161 611->617 618 a931ae-a931b3 611->618 613->612 621 ad2d9c-ad2d9f 614->621 622 a93201-a9320f KillTimer call a930f2 614->622 615->613 619 a93246-a93251 CreatePopupMenu 615->619 632 ad2e77 617->632 626 ad2e4d-ad2e54 618->626 627 a931b9-a931be 618->627 619->613 629 ad2dd7-ad2df6 MoveWindow 621->629 630 ad2da1-ad2da5 621->630 631 a93214 call a93c50 622->631 626->606 639 ad2e5a-ad2e63 call af0ad7 626->639 634 a93253-a93263 call a9326f 627->634 635 a931c4-a931ca 627->635 629->613 637 ad2da7-ad2daa 630->637 638 ad2dc6-ad2dd2 SetFocus 630->638 631->613 632->613 634->613 635->606 635->643 636->606 637->635 644 ad2db0-ad2dc1 call a918e2 637->644 638->613 639->606 643->606 647 ad2e35-ad2e48 call a930f2 call a93837 643->647 644->613 647->606
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00A9316A,?,?), ref: 00A931D8
                                                                                                                                                                                                                                                                              • KillTimer.USER32(?,00000001,?,?,?,?,?,00A9316A,?,?), ref: 00A93204
                                                                                                                                                                                                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A93227
                                                                                                                                                                                                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00A9316A,?,?), ref: 00A93232
                                                                                                                                                                                                                                                                              • CreatePopupMenu.USER32 ref: 00A93246
                                                                                                                                                                                                                                                                              • PostQuitMessage.USER32(00000000), ref: 00A93267
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                                                              • String ID: TaskbarCreated
                                                                                                                                                                                                                                                                              • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                                                              • Opcode ID: ab19a9d1f4ccad66a1617c2975a80ed00376f9158453edaf0228e62a295b5c7a
                                                                                                                                                                                                                                                                              • Instruction ID: 1bb39c221319e72f7f5f099ea5766b8a185b4942e976f9c91ad1c7ba16c6d951
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ab19a9d1f4ccad66a1617c2975a80ed00376f9158453edaf0228e62a295b5c7a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3541E333344204AADF245BBC9D49BBD3AFAEB15340F180626F612872F1CFA58E41D7A5

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 654 a91410-a91449 655 ad24b8-ad24b9 DestroyWindow 654->655 656 a9144f-a91465 mciSendStringW 654->656 661 ad24c4-ad24d1 655->661 657 a9146b-a91473 656->657 658 a916c6-a916d3 656->658 657->661 662 a91479-a91488 call a9182e 657->662 659 a916f8-a916ff 658->659 660 a916d5-a916f0 UnregisterHotKey 658->660 659->657 664 a91705 659->664 660->659 663 a916f2-a916f3 call a910d0 660->663 665 ad2500-ad2507 661->665 666 ad24d3-ad24d6 661->666 673 ad250e-ad251a 662->673 674 a9148e-a91496 662->674 663->659 664->658 665->661 670 ad2509 665->670 671 ad24d8-ad24e0 call a96246 666->671 672 ad24e2-ad24e5 FindClose 666->672 670->673 675 ad24eb-ad24f8 671->675 672->675 680 ad251c-ad251e FreeLibrary 673->680 681 ad2524-ad252b 673->681 677 a9149c-a914c1 call a9cfa0 674->677 678 ad2532-ad253f 674->678 675->665 679 ad24fa-ad24fb call b032b1 675->679 691 a914f8-a91503 CoUninitialize 677->691 692 a914c3 677->692 686 ad2566-ad256d 678->686 687 ad2541-ad255e VirtualFree 678->687 679->665 680->681 681->673 685 ad252d 681->685 685->678 686->678 688 ad256f 686->688 687->686 690 ad2560-ad2561 call b03317 687->690 694 ad2574-ad2578 688->694 690->686 691->694 696 a91509-a9150e 691->696 695 a914c6-a914f6 call a91a05 call a919ae 692->695 694->696 697 ad257e-ad2584 694->697 695->691 699 ad2589-ad2596 call b032eb 696->699 700 a91514-a9151e 696->700 697->696 713 ad2598 699->713 703 a91524-a915a5 call a9988f call a91944 call a917d5 call aafe14 call a9177c call a9988f call a9cfa0 call a917fe call aafe14 700->703 704 a91707-a91714 call aaf80e 700->704 717 ad259d-ad25bf call aafdcd 703->717 743 a915ab-a915cf call aafe14 703->743 704->703 715 a9171a 704->715 713->717 715->704 723 ad25c1 717->723 725 ad25c6-ad25e8 call aafdcd 723->725 731 ad25ea 725->731 734 ad25ef-ad2611 call aafdcd 731->734 740 ad2613 734->740 744 ad2618-ad2625 call af64d4 740->744 743->725 749 a915d5-a915f9 call aafe14 743->749 750 ad2627 744->750 749->734 755 a915ff-a91619 call aafe14 749->755 752 ad262c-ad2639 call aaac64 750->752 758 ad263b 752->758 755->744 760 a9161f-a91643 call a917d5 call aafe14 755->760 761 ad2640-ad264d call b03245 758->761 760->752 769 a91649-a91651 760->769 767 ad264f 761->767 771 ad2654-ad2661 call b032cc 767->771 769->761 770 a91657-a91675 call a9988f call a9190a 769->770 770->771 779 a9167b-a91689 770->779 777 ad2663 771->777 780 ad2668-ad2675 call b032cc 777->780 779->780 782 a9168f-a916c5 call a9988f * 3 call a91876 779->782 785 ad2677 780->785 785->785
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00A91459
                                                                                                                                                                                                                                                                              • CoUninitialize.COMBASE ref: 00A914F8
                                                                                                                                                                                                                                                                              • UnregisterHotKey.USER32(?), ref: 00A916DD
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00AD24B9
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(?), ref: 00AD251E
                                                                                                                                                                                                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00AD254B
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                                                              • String ID: close all
                                                                                                                                                                                                                                                                              • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                                                              • Opcode ID: dbb01f7f85858edb496c931454496336ddb3aa4c2922ec179982e91e01f73328
                                                                                                                                                                                                                                                                              • Instruction ID: 2ab2c5f0bcb6f879c6c6c2be72362777cc0dc7329246ab2f96bebf71118b0b9d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dbb01f7f85858edb496c931454496336ddb3aa4c2922ec179982e91e01f73328
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 20D167317012228FDB29EF55D999B29F7E4BF15700F1542AEE44A6B3A1DB30AC12CF91

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 803 a92c63-a92cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A92C91
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A92CB2
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00A91CAD,?), ref: 00A92CC6
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00A91CAD,?), ref: 00A92CCF
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$CreateShow
                                                                                                                                                                                                                                                                              • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                                                              • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                                                              • Opcode ID: 619c86d388b0ce7feac1a98503a339ec347fd8bca7f7a428c270354df3315a5d
                                                                                                                                                                                                                                                                              • Instruction ID: f7be2af008088a2f59d26a67ebf3fde02dea969452b011b2139dc93f8b2fc32a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 619c86d388b0ce7feac1a98503a339ec347fd8bca7f7a428c270354df3315a5d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 80F0FE755402907AEB711B1BAC08E7B3EBDD7CAF50F04045EF905A36F0CAB91851EAB9

                                                                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                                                                              control_flow_graph 954 a93b1c-a93b27 955 a93b99-a93b9b 954->955 956 a93b29-a93b2e 954->956 957 a93b8c-a93b8f 955->957 956->955 958 a93b30-a93b48 RegOpenKeyExW 956->958 958->955 959 a93b4a-a93b69 RegQueryValueExW 958->959 960 a93b6b-a93b76 959->960 961 a93b80-a93b8b RegCloseKey 959->961 962 a93b78-a93b7a 960->962 963 a93b90-a93b97 960->963 961->957 964 a93b7e 962->964 963->964 964->961
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00A93B0F,SwapMouseButtons,00000004,?), ref: 00A93B40
                                                                                                                                                                                                                                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00A93B0F,SwapMouseButtons,00000004,?), ref: 00A93B61
                                                                                                                                                                                                                                                                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00A93B0F,SwapMouseButtons,00000004,?), ref: 00A93B83
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                                                              • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                                                              • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                                                              • Opcode ID: 9de238bc62affca2e30e1105c24ddaa50c1f14ac040589aea170bbc661a5122e
                                                                                                                                                                                                                                                                              • Instruction ID: b8e0091323c0619fb1049221dcb659be5825b5b24f16d307c65e69712fea9b79
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9de238bc62affca2e30e1105c24ddaa50c1f14ac040589aea170bbc661a5122e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CA112AB6610208FFDF218FA5DC44EAFBBF8EF04744B104459A806D7210D6719E4197A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00AD33A2
                                                                                                                                                                                                                                                                                • Part of subcall function 00A96B57: _wcslen.LIBCMT ref: 00A96B6A
                                                                                                                                                                                                                                                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A93A04
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                                                              • String ID: Line:
                                                                                                                                                                                                                                                                              • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                                                                              • Opcode ID: b5cd33e61d43077973c4890a47498be89d64fb4f66aa863e26f1eed26ee1f1bb
                                                                                                                                                                                                                                                                              • Instruction ID: 6e0839b26d543462fb28959849b7901cdbb5f8faf74edca7bf3c8f2f117a0ae3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b5cd33e61d43077973c4890a47498be89d64fb4f66aa863e26f1eed26ee1f1bb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F931C372608300AADF21EB24DC45BEFB7E8AF44710F04492AF59A971D1DFB49A48C7C6
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00AB0668
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB32A4: RaiseException.KERNEL32(?,?,?,00AB068A,?,00B61444,?,?,?,?,?,?,00AB068A,00A91129,00B58738,00A91129), ref: 00AB3304
                                                                                                                                                                                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00AB0685
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                                                              • String ID: Unknown exception
                                                                                                                                                                                                                                                                              • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                                                              • Opcode ID: 3f86f86c3fc0d67fe95a05f8cc3338ac94d65b5f9187ceea34f8fb64c18df091
                                                                                                                                                                                                                                                                              • Instruction ID: 4cf607626431ed7a03da8e5ef207c7c4f552c72fc2a2c27b1608d7dcbcbae58a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3f86f86c3fc0d67fe95a05f8cc3338ac94d65b5f9187ceea34f8fb64c18df091
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 92F0C23590030D7B8F14B7A4D956DDF77BC9E00354B608171B814D65E3EF71DA29C680
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A91BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A91BF4
                                                                                                                                                                                                                                                                                • Part of subcall function 00A91BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00A91BFC
                                                                                                                                                                                                                                                                                • Part of subcall function 00A91BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A91C07
                                                                                                                                                                                                                                                                                • Part of subcall function 00A91BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A91C12
                                                                                                                                                                                                                                                                                • Part of subcall function 00A91BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00A91C1A
                                                                                                                                                                                                                                                                                • Part of subcall function 00A91BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00A91C22
                                                                                                                                                                                                                                                                                • Part of subcall function 00A91B4A: RegisterWindowMessageW.USER32(00000004,?,00A912C4), ref: 00A91BA2
                                                                                                                                                                                                                                                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00A9136A
                                                                                                                                                                                                                                                                              • OleInitialize.OLE32 ref: 00A91388
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000), ref: 00AD24AB
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1986988660-0
                                                                                                                                                                                                                                                                              • Opcode ID: de94ba151ae9ad01a3bd935e0f76d2dc58b6c6923a3c6f73e04a0ddc3ea7e560
                                                                                                                                                                                                                                                                              • Instruction ID: 2d5d829024fb4c2481df1d6fb74fe1eccf81bb3bcc923dd7fb32b58643bbbdad
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: de94ba151ae9ad01a3bd935e0f76d2dc58b6c6923a3c6f73e04a0ddc3ea7e560
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0171BDB5A122018EC784DF7EE945659BAE4FBA834471C8E6AD40BC73E1EFB84440CF95
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A93A04
                                                                                                                                                                                                                                                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AFC259
                                                                                                                                                                                                                                                                              • KillTimer.USER32(?,00000001,?,?), ref: 00AFC261
                                                                                                                                                                                                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AFC270
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3500052701-0
                                                                                                                                                                                                                                                                              • Opcode ID: a2495529d78b3522c5e387318dfa0ba2c8d7a4efecfec1e697523209b818bf6f
                                                                                                                                                                                                                                                                              • Instruction ID: 2552a4f82619a4bf5c9ff29ba6fed066f7e1c02990018007ba8691c8e4c3d3bb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a2495529d78b3522c5e387318dfa0ba2c8d7a4efecfec1e697523209b818bf6f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C31C370904348AFEB329FA58955BEBBBFCAF06314F04049AE2DA97241C7745A85CB51
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CloseHandle.KERNELBASE(00000000,00000000,?,?,00AC85CC,?,00B58CC8,0000000C), ref: 00AC8704
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00AC85CC,?,00B58CC8,0000000C), ref: 00AC870E
                                                                                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00AC8739
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2583163307-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4ea639a47d145d79165f46ad34a9a17750ffd984735a8463c1655a2a4fd332b2
                                                                                                                                                                                                                                                                              • Instruction ID: 0698a35994315603b2084d7fe042195be3d51c59e69c11c4b57d20bc5f35c47b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4ea639a47d145d79165f46ad34a9a17750ffd984735a8463c1655a2a4fd332b2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5D014E32A0566026D7346334A945F7F6B595B92778F3B021DF8148F2D2DEB8ECC19190
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • TranslateMessage.USER32(?), ref: 00A9DB7B
                                                                                                                                                                                                                                                                              • DispatchMessageW.USER32(?), ref: 00A9DB89
                                                                                                                                                                                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A9DB9F
                                                                                                                                                                                                                                                                              • Sleep.KERNELBASE(0000000A), ref: 00A9DBB1
                                                                                                                                                                                                                                                                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00AE1CC9
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3288985973-0
                                                                                                                                                                                                                                                                              • Opcode ID: a3dbc77e7ce26d9e9691ee464ede8ba72436b1f6126c6543a1ae8a9c71f059c0
                                                                                                                                                                                                                                                                              • Instruction ID: d96e68ec2959974e25c68ba9b1c8e55fbc3cc357f9bba108c820642a8c7d037b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a3dbc77e7ce26d9e9691ee464ede8ba72436b1f6126c6543a1ae8a9c71f059c0
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 00F0FE316443809BEB30CB658D89FAA77F8EB85350F104A19E65AD70D0DB7498899B25
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • __Init_thread_footer.LIBCMT ref: 00AA17F6
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Init_thread_footer
                                                                                                                                                                                                                                                                              • String ID: CALL
                                                                                                                                                                                                                                                                              • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                                                              • Opcode ID: 82904a27a9c8cf14948c7406087a24152e64aef36327d944ea1359b99680c88e
                                                                                                                                                                                                                                                                              • Instruction ID: 2b1cc03ae0a54d9d983c5fbf351ce4f329d0fd145659c7448ee36d1797ed983a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 82904a27a9c8cf14948c7406087a24152e64aef36327d944ea1359b99680c88e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B722AC70608341EFC714DF25C590A2ABBF1BF9A354F24896DF4968B3A2D735E841CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetOpenFileNameW.COMDLG32(?), ref: 00AD2C8C
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A93A97,?,?,00A92E7F,?,?,?,00000000), ref: 00A93AC2
                                                                                                                                                                                                                                                                                • Part of subcall function 00A92DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A92DC4
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                                                              • String ID: X
                                                                                                                                                                                                                                                                              • API String ID: 779396738-3081909835
                                                                                                                                                                                                                                                                              • Opcode ID: 5457d8d1a2d22cbb5337854d9fe7962f3bf9884c8f44290952bfc85bddc6b9e3
                                                                                                                                                                                                                                                                              • Instruction ID: 8eb37debe74555f046a57871f3c8ec1169f969a56de10c4533686e3134d78300
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5457d8d1a2d22cbb5337854d9fe7962f3bf9884c8f44290952bfc85bddc6b9e3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5021A571A10258AFDF41DF94C945BEE7BFCAF48305F40405AE405A7341DBB45A89CFA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A93908
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1144537725-0
                                                                                                                                                                                                                                                                              • Opcode ID: c0433854a1f201cab07dddbc301956dc586b261d154237dbfbf70f0d1ef871f2
                                                                                                                                                                                                                                                                              • Instruction ID: 7c793e90045a593d58402b854ce3d8cbff33ed9f9607295fe3f97d280c82843f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c0433854a1f201cab07dddbc301956dc586b261d154237dbfbf70f0d1ef871f2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 893195716043019FDB20DF64D984797BBF4FB49708F04092EF59A87380D7B5AA44CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • timeGetTime.WINMM ref: 00AAF661
                                                                                                                                                                                                                                                                                • Part of subcall function 00A9D730: GetInputState.USER32 ref: 00A9D807
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000), ref: 00AEF2DE
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4149333218-0
                                                                                                                                                                                                                                                                              • Opcode ID: 71cc42022eec05f6e46bd202f975570cb02a8232978bfe0288e5216439c8efa3
                                                                                                                                                                                                                                                                              • Instruction ID: 57e97293c34c80d7202486016d79fa86e1294433f3dbecb6f381ded76865142a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 71cc42022eec05f6e46bd202f975570cb02a8232978bfe0288e5216439c8efa3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5FF08C313406059FD714EFA9E649B6ABBE8EF45761F000029E85AC72A1DB70A800CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • __Init_thread_footer.LIBCMT ref: 00A9BB4E
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Init_thread_footer
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1385522511-0
                                                                                                                                                                                                                                                                              • Opcode ID: 5c9da3d099324a1816ddec9bcb4b45f1ba73856dd79426cd90b9d2e6fab90685
                                                                                                                                                                                                                                                                              • Instruction ID: ec58a441b9d2c1bee61868d44e4b71dddb39f7ceb35c65e30d7fc213e4c07f7a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5c9da3d099324a1816ddec9bcb4b45f1ba73856dd79426cd90b9d2e6fab90685
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3D32AE74A10249DFDF20CF55DA94EBEB7F9EF44300F148059E915AB2A1C7B8AD81CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A94E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00A94EDD,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94E9C
                                                                                                                                                                                                                                                                                • Part of subcall function 00A94E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A94EAE
                                                                                                                                                                                                                                                                                • Part of subcall function 00A94E90: FreeLibrary.KERNEL32(00000000,?,?,00A94EDD,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94EC0
                                                                                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94EFD
                                                                                                                                                                                                                                                                                • Part of subcall function 00A94E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00AD3CDE,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94E62
                                                                                                                                                                                                                                                                                • Part of subcall function 00A94E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A94E74
                                                                                                                                                                                                                                                                                • Part of subcall function 00A94E59: FreeLibrary.KERNEL32(00000000,?,?,00AD3CDE,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94E87
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2632591731-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4b3330898d2937048c725cbfb580c0837b7af9044de9145e6e61d8e39471d75e
                                                                                                                                                                                                                                                                              • Instruction ID: b9ac25d9a2644a9440d5924efdf9aefe4a1004abb0a43f7419663254291db3c2
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4b3330898d2937048c725cbfb580c0837b7af9044de9145e6e61d8e39471d75e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9A11E732710206AACF24FF74DD06FED77E59F44B50F20842DF542A61D1EE709A0A9750
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: __wsopen_s
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3347428461-0
                                                                                                                                                                                                                                                                              • Opcode ID: e44eddd0d613fa1ecdfebf77cc3b4b8b76d0954e3a56e42d821e0c3415770d5a
                                                                                                                                                                                                                                                                              • Instruction ID: a269f8ac8bd9a2d65d64d064b5fad0f23bd722b37614b64dbcdafa57b22562d6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e44eddd0d613fa1ecdfebf77cc3b4b8b76d0954e3a56e42d821e0c3415770d5a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1811187590410AAFCB09DF58EA41E9B7BF5FF48314F154069F809AB312DA31DA11CBA5
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC4C7D: RtlAllocateHeap.NTDLL(00000008,00A91129,00000000,?,00AC2E29,00000001,00000364,?,?,?,00ABF2DE,00AC3863,00B61444,?,00AAFDF5,?), ref: 00AC4CBE
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC506C
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AllocateHeap_free
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 614378929-0
                                                                                                                                                                                                                                                                              • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                                              • Instruction ID: a666b3b1ba6191d6492cca690b9d444ace2b5830b39cfff2cbb756a70062a7ac
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C10126726047046FE3218F69D881F5AFBE8FB89370F26052DF58483280EA30A945C7B4
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                                              • Instruction ID: ad37286070f7b5f0400820f9bc76f6706c50c36a48a71fc9e3c46df8bbf440eb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3BF02832511B149AD7317B798E15FDA379C9F52334F110719F821931D3DB74D80186A5
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • RtlAllocateHeap.NTDLL(00000008,00A91129,00000000,?,00AC2E29,00000001,00000364,?,?,?,00ABF2DE,00AC3863,00B61444,?,00AAFDF5,?), ref: 00AC4CBE
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AllocateHeap
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                              • Opcode ID: 75cb7b24a4c48c7dbf21bc73abaa7df322042cdae6336fc6e542ac1ee9111ccd
                                                                                                                                                                                                                                                                              • Instruction ID: c145c758651dff806b6b3297ada15354988eb57d3ade46c28d49cc904434f6b8
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 75cb7b24a4c48c7dbf21bc73abaa7df322042cdae6336fc6e542ac1ee9111ccd
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8FF0243160E22066DB201F229D15F9A379CAF487B1B1A4119FC05AB2A2CA30D81042E8
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,00B61444,?,00AAFDF5,?,?,00A9A976,00000010,00B61440,00A913FC,?,00A913C6,?,00A91129), ref: 00AC3852
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AllocateHeap
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                              • Opcode ID: 629f5c16c2b47a5909070c5122a7c6b745bff64ce6fd5dda240fc272d555309e
                                                                                                                                                                                                                                                                              • Instruction ID: 3801c7e02b8996f3eeb3c06344fe3685b6801e9b7a14a7e829bff16f000d1ab7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 629f5c16c2b47a5909070c5122a7c6b745bff64ce6fd5dda240fc272d555309e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 29E0E53310622466EE312F779D01FDA365CAB42BB0F1B8028BC05935C2CF10DD0187E4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(?,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94F6D
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FreeLibrary
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3664257935-0
                                                                                                                                                                                                                                                                              • Opcode ID: 6fe8952b6da43800beb1dffb775b64688a5ec662cbd61a7d95cd1a990b868b9a
                                                                                                                                                                                                                                                                              • Instruction ID: 6d0a1eaf5ef0904d93d3c7206dd5a1a4c0f8b438300336d056abba7da6b67734
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6fe8952b6da43800beb1dffb775b64688a5ec662cbd61a7d95cd1a990b868b9a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CAF01575205752CFDF349F64D594C66BBF4AF187293208A6EE1EA82621CB319845DB10
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • IsWindow.USER32(00000000), ref: 00B22A66
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2353593579-0
                                                                                                                                                                                                                                                                              • Opcode ID: e26bafb395cc2cdb615aaf9921d76169564a16c86f2d4b42c517bb35cd6bee4e
                                                                                                                                                                                                                                                                              • Instruction ID: 5ff11e03e4adaf36af73bca0308c1835ed3c049265579e7c8a29a6c0c2bebef7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e26bafb395cc2cdb615aaf9921d76169564a16c86f2d4b42c517bb35cd6bee4e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 79E04F3635012ABAC714EB70ECC08FE779CEB553D57104576BD1AD2550DB30999586A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00A9314E
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1144537725-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8622b12a97fcaff99418fc8f15925847e9ab736c299d7565670397e02bc62285
                                                                                                                                                                                                                                                                              • Instruction ID: fd35b010ad7b86ef7578379d535b86f7850762f46df7716f5b2f77c681e12533
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8622b12a97fcaff99418fc8f15925847e9ab736c299d7565670397e02bc62285
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FDF03770914314AFEB529B24DC457DA7BFCA701708F0401E5E54997292DBB45788CF95
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A92DC4
                                                                                                                                                                                                                                                                                • Part of subcall function 00A96B57: _wcslen.LIBCMT ref: 00A96B6A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 541455249-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4c5a0af07fa541477422ee50eb74670bfc4e946d2b5a0f35672b341cc8a0fdb8
                                                                                                                                                                                                                                                                              • Instruction ID: e0af481f5c6e7d8878a57871a43f6b63f49f3a9665097982afd1a7d69b66dbfe
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4c5a0af07fa541477422ee50eb74670bfc4e946d2b5a0f35672b341cc8a0fdb8
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D2E0CD766001245BCB209798DC05FDA77DDDFC8790F040072FD09D7248DD60AD848550
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A93908
                                                                                                                                                                                                                                                                                • Part of subcall function 00A9D730: GetInputState.USER32 ref: 00A9D807
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A92B6B
                                                                                                                                                                                                                                                                                • Part of subcall function 00A930F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00A9314E
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3667716007-0
                                                                                                                                                                                                                                                                              • Opcode ID: 329a65308ea526b301292def47703f37d9620f52a13933dd89e4396176cb2309
                                                                                                                                                                                                                                                                              • Instruction ID: 9fdec6777f8b13066f183bbaaf2f87c63b7953dde79b8356f471a20aecd5028f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 329a65308ea526b301292def47703f37d9620f52a13933dd89e4396176cb2309
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A2E07D2330020417CE08FB799A5257DB7E98FD1351F400C3EF142832A3CF2445454312
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateFileW.KERNELBASE(00000000,00000000,?,00AD0704,?,?,00000000,?,00AD0704,00000000,0000000C), ref: 00AD03B7
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CreateFile
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 823142352-0
                                                                                                                                                                                                                                                                              • Opcode ID: b79da048a88e077db484a806f303490c283a5a3e5358b0fee795865b86fa5123
                                                                                                                                                                                                                                                                              • Instruction ID: bc2a882971188e17893bf832bcc1c4e3f5f8a3b6ac789fa3b4e9843853a05ccf
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b79da048a88e077db484a806f303490c283a5a3e5358b0fee795865b86fa5123
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 21D06C3204010DBBDF128F84DD06EDA3FAAFB48714F014000BE1866020C732E832AB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00A91CBC
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: InfoParametersSystem
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3098949447-0
                                                                                                                                                                                                                                                                              • Opcode ID: 3a7b648b5be7b9ae203d918617a6c926de1d845b083ca70a885214cf7b2d8f6a
                                                                                                                                                                                                                                                                              • Instruction ID: e2f24020635d4a8b99b295cb5d47b184bddd7a721c3d7862f2b5a4b652c2ac2b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3a7b648b5be7b9ae203d918617a6c926de1d845b083ca70a885214cf7b2d8f6a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 13C09B35280304AFF2244784BC4BF147754A768B00F044401F70A575E3CBE55410D654
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00B2961A
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B2965B
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00B2969F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B296C9
                                                                                                                                                                                                                                                                              • SendMessageW.USER32 ref: 00B296F2
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(00000011), ref: 00B2978B
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(00000009), ref: 00B29798
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B297AE
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(00000010), ref: 00B297B8
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B297E9
                                                                                                                                                                                                                                                                              • SendMessageW.USER32 ref: 00B29810
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001030,?,00B27E95), ref: 00B29918
                                                                                                                                                                                                                                                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00B2992E
                                                                                                                                                                                                                                                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B29941
                                                                                                                                                                                                                                                                              • SetCapture.USER32(?), ref: 00B2994A
                                                                                                                                                                                                                                                                              • ClientToScreen.USER32(?,?), ref: 00B299AF
                                                                                                                                                                                                                                                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B299BC
                                                                                                                                                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B299D6
                                                                                                                                                                                                                                                                              • ReleaseCapture.USER32 ref: 00B299E1
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00B29A19
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00B29A26
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B29A80
                                                                                                                                                                                                                                                                              • SendMessageW.USER32 ref: 00B29AAE
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B29AEB
                                                                                                                                                                                                                                                                              • SendMessageW.USER32 ref: 00B29B1A
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B29B3B
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B29B4A
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00B29B68
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00B29B75
                                                                                                                                                                                                                                                                              • GetParent.USER32(?), ref: 00B29B93
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B29BFA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32 ref: 00B29C2B
                                                                                                                                                                                                                                                                              • ClientToScreen.USER32(?,?), ref: 00B29C84
                                                                                                                                                                                                                                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B29CB4
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B29CDE
                                                                                                                                                                                                                                                                              • SendMessageW.USER32 ref: 00B29D01
                                                                                                                                                                                                                                                                              • ClientToScreen.USER32(?,?), ref: 00B29D4E
                                                                                                                                                                                                                                                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B29D82
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9944: GetWindowLongW.USER32(?,000000EB), ref: 00AA9952
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B29E05
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                                                                              • String ID: @GUI_DRAGID$F
                                                                                                                                                                                                                                                                              • API String ID: 3429851547-4164748364
                                                                                                                                                                                                                                                                              • Opcode ID: 9d2e07b45e7e644e0929a03443acc9c6a0abf6293b788ae292130b16d97bf902
                                                                                                                                                                                                                                                                              • Instruction ID: 0bea87f756f0e2c356213be2ee498102034d3ef434f0f3f152c940e4484d2ea1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9d2e07b45e7e644e0929a03443acc9c6a0abf6293b788ae292130b16d97bf902
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AC429B34204211AFDB26CF28DC84EAABBE5FF49710F140A99F69D872A1DB71E851CF51
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00B248F3
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00B24908
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00B24927
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00B2494B
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00B2495C
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00B2497B
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00B249AE
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00B249D4
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00B24A0F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00B24A56
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00B24A7E
                                                                                                                                                                                                                                                                              • IsMenu.USER32(?), ref: 00B24A97
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B24AF2
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B24B20
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B24B94
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00B24BE3
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00B24C82
                                                                                                                                                                                                                                                                              • wsprintfW.USER32 ref: 00B24CAE
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B24CC9
                                                                                                                                                                                                                                                                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00B24CF1
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B24D13
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B24D33
                                                                                                                                                                                                                                                                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00B24D5A
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                                                                              • String ID: %d/%02d/%02d
                                                                                                                                                                                                                                                                              • API String ID: 4054740463-328681919
                                                                                                                                                                                                                                                                              • Opcode ID: 09201b4785d8d0543aa10ac775d206d2323c05330609f27bf10feeb01def6afb
                                                                                                                                                                                                                                                                              • Instruction ID: 9b276087356cb7e4ffd615216d7bc45af9cc26abee94f07feaf141981bf7cde6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 09201b4785d8d0543aa10ac775d206d2323c05330609f27bf10feeb01def6afb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5312F171600224ABEB358F28ED49FAE7BF8EF85310F1041A9F519DB6E1DB789941CB50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00AAF998
                                                                                                                                                                                                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00AEF474
                                                                                                                                                                                                                                                                              • IsIconic.USER32(00000000), ref: 00AEF47D
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(00000000,00000009), ref: 00AEF48A
                                                                                                                                                                                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00AEF494
                                                                                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00AEF4AA
                                                                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00AEF4B1
                                                                                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00AEF4BD
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00AEF4CE
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00AEF4D6
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00AEF4DE
                                                                                                                                                                                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00AEF4E1
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AEF4F6
                                                                                                                                                                                                                                                                              • keybd_event.USER32(00000012,00000000), ref: 00AEF501
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AEF50B
                                                                                                                                                                                                                                                                              • keybd_event.USER32(00000012,00000000), ref: 00AEF510
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AEF519
                                                                                                                                                                                                                                                                              • keybd_event.USER32(00000012,00000000), ref: 00AEF51E
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AEF528
                                                                                                                                                                                                                                                                              • keybd_event.USER32(00000012,00000000), ref: 00AEF52D
                                                                                                                                                                                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00AEF530
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00AEF557
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                                                              • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                              • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                                                              • Opcode ID: e55268976fa0ed7deb4fc726a209527116a96f40bf7410688902560e75b972e4
                                                                                                                                                                                                                                                                              • Instruction ID: 272f57222654056b34e324e057465b95526e54886bb54c781a52c22316e5cdcd
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e55268976fa0ed7deb4fc726a209527116a96f40bf7410688902560e75b972e4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 88314371A40218BFEB316BB65C4AFBF7E6CEB44B50F100065FA01E71D1CBB19D01AAA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AF170D
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AF173A
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF16C3: GetLastError.KERNEL32 ref: 00AF174A
                                                                                                                                                                                                                                                                              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00AF1286
                                                                                                                                                                                                                                                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00AF12A8
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00AF12B9
                                                                                                                                                                                                                                                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00AF12D1
                                                                                                                                                                                                                                                                              • GetProcessWindowStation.USER32 ref: 00AF12EA
                                                                                                                                                                                                                                                                              • SetProcessWindowStation.USER32(00000000), ref: 00AF12F4
                                                                                                                                                                                                                                                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00AF1310
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00AF11FC), ref: 00AF10D4
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10BF: CloseHandle.KERNEL32(?,?,00AF11FC), ref: 00AF10E9
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                                                              • String ID: $default$winsta0
                                                                                                                                                                                                                                                                              • API String ID: 22674027-1027155976
                                                                                                                                                                                                                                                                              • Opcode ID: 37910e3ed8233afc82793de08580e01b5ed967b012a5c9896f38869ae1f8bbe1
                                                                                                                                                                                                                                                                              • Instruction ID: 3197d0992d4ec00ffcc15c23f7ef462028b2d01d209da9620d79f87946cd7283
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 37910e3ed8233afc82793de08580e01b5ed967b012a5c9896f38869ae1f8bbe1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7F8187B1A00208EBEF259FE4DD49FFE7BB9EF48705F144129FA11A61A0CB348945CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AF1114
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF1120
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF112F
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF1136
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AF114D
                                                                                                                                                                                                                                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00AF0BCC
                                                                                                                                                                                                                                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00AF0C00
                                                                                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00AF0C17
                                                                                                                                                                                                                                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00AF0C51
                                                                                                                                                                                                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00AF0C6D
                                                                                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00AF0C84
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00AF0C8C
                                                                                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00AF0C93
                                                                                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00AF0CB4
                                                                                                                                                                                                                                                                              • CopySid.ADVAPI32(00000000), ref: 00AF0CBB
                                                                                                                                                                                                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00AF0CEA
                                                                                                                                                                                                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00AF0D0C
                                                                                                                                                                                                                                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00AF0D1E
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AF0D45
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF0D4C
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AF0D55
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF0D5C
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AF0D65
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF0D6C
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00AF0D78
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF0D7F
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1193: GetProcessHeap.KERNEL32(00000008,00AF0BB1,?,00000000,?,00AF0BB1,?), ref: 00AF11A1
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00AF0BB1,?), ref: 00AF11A8
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00AF0BB1,?), ref: 00AF11B7
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4175595110-0
                                                                                                                                                                                                                                                                              • Opcode ID: 75f89d57276a2d0cefb78d497b3d87fe6269c43ec10e609150797ad8fb0a0451
                                                                                                                                                                                                                                                                              • Instruction ID: 5cb48a489be624d6d375a9f22baaf17de2936d9869a2ebb0dff73ab0bc06c37e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 75f89d57276a2d0cefb78d497b3d87fe6269c43ec10e609150797ad8fb0a0451
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C171497290020AABDF209FE4DC45FBEBBB9BF04300F144515FA14A7192DB75A906CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • OpenClipboard.USER32(00B2CC08), ref: 00B0EB29
                                                                                                                                                                                                                                                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B0EB37
                                                                                                                                                                                                                                                                              • GetClipboardData.USER32(0000000D), ref: 00B0EB43
                                                                                                                                                                                                                                                                              • CloseClipboard.USER32 ref: 00B0EB4F
                                                                                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00B0EB87
                                                                                                                                                                                                                                                                              • CloseClipboard.USER32 ref: 00B0EB91
                                                                                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00B0EBBC
                                                                                                                                                                                                                                                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 00B0EBC9
                                                                                                                                                                                                                                                                              • GetClipboardData.USER32(00000001), ref: 00B0EBD1
                                                                                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00B0EBE2
                                                                                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00B0EC22
                                                                                                                                                                                                                                                                              • IsClipboardFormatAvailable.USER32(0000000F), ref: 00B0EC38
                                                                                                                                                                                                                                                                              • GetClipboardData.USER32(0000000F), ref: 00B0EC44
                                                                                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00B0EC55
                                                                                                                                                                                                                                                                              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00B0EC77
                                                                                                                                                                                                                                                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00B0EC94
                                                                                                                                                                                                                                                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00B0ECD2
                                                                                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00B0ECF3
                                                                                                                                                                                                                                                                              • CountClipboardFormats.USER32 ref: 00B0ED14
                                                                                                                                                                                                                                                                              • CloseClipboard.USER32 ref: 00B0ED59
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 420908878-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4e42cbe3189124c2375a04a1cae769bc25a64012a9fcb116bd964bfb43fe8c13
                                                                                                                                                                                                                                                                              • Instruction ID: 257769fe5872c9e6ef4015d8272b73af814aa43fcda37ff9da88fc7b9e0a7980
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4e42cbe3189124c2375a04a1cae769bc25a64012a9fcb116bd964bfb43fe8c13
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6361AD35204201AFD710EF24D994F6A7BE4EF84704F14499DF8669B2E2DF31E906CBA2
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00B069BE
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00B06A12
                                                                                                                                                                                                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B06A4E
                                                                                                                                                                                                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B06A75
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B06AB2
                                                                                                                                                                                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B06ADF
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                                                              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                                                              • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                                                              • Opcode ID: 63608ac6f610ce980dcf0c1553914459114dca871de03a7c955b1e7661582ea5
                                                                                                                                                                                                                                                                              • Instruction ID: c913644a54f8d8e616e8a8c64918fb0e0120c6a54a023bed60d0d84fa93fc73e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 63608ac6f610ce980dcf0c1553914459114dca871de03a7c955b1e7661582ea5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: ABD16172608300AFC714EBA4C982EAFB7ECAF98704F44495DF589C7191EB74DA44CB62
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B09663
                                                                                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00B096A1
                                                                                                                                                                                                                                                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00B096BB
                                                                                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00B096D3
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00B096DE
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00B096FA
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00B0974A
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(00B56B7C), ref: 00B09768
                                                                                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B09772
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00B0977F
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00B0978F
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                                                                                              • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                                                              • Opcode ID: dc6e48c64a60fbb7f9bd3d8ef091e905bd39ba2380c765861808c24f5e1c74d9
                                                                                                                                                                                                                                                                              • Instruction ID: 5c7b9153e6f9d546526971feefd04f658fdd1771632452b31c40a4640e11bf4c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dc6e48c64a60fbb7f9bd3d8ef091e905bd39ba2380c765861808c24f5e1c74d9
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4731BE32541619AEDB24AFB4EC49ADE7BECEF09321F1041D5F815E30E2DB70DE458A54
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B097BE
                                                                                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00B09819
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00B09824
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00B09840
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00B09890
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(00B56B7C), ref: 00B098AE
                                                                                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B098B8
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00B098C5
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00B098D5
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00AFDB00
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                                                                                              • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                                                              • Opcode ID: 09c48e4412d532bba98c7b6be429db52a78defe70fcd5cc4976eec55aac863a4
                                                                                                                                                                                                                                                                              • Instruction ID: cf909551a330fdbffa4b0c2416b1ac65017b2f42c102e254fd2b2c1e9608705d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 09c48e4412d532bba98c7b6be429db52a78defe70fcd5cc4976eec55aac863a4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6E31C531501719AEDB24EFB4EC49ADE7BECEF06360F1081D5E914A31E2DB70DD458A64
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B1B6AE,?,?), ref: 00B1C9B5
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1C9F1
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1CA68
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1CA9E
                                                                                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B1BF3E
                                                                                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00B1BFA9
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00B1BFCD
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B1C02C
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B1C0E7
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00B1C154
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00B1C1E9
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00B1C23A
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00B1C2E3
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B1C382
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00B1C38F
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3102970594-0
                                                                                                                                                                                                                                                                              • Opcode ID: a50ce38d70b936d7ab4eb157aeae23907b145d144b8ab049c6409070c127293e
                                                                                                                                                                                                                                                                              • Instruction ID: 64c84cc90b12b7d1c9585ac9695f6c491c8c78be48a48145bf5d9b8116ef7269
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a50ce38d70b936d7ab4eb157aeae23907b145d144b8ab049c6409070c127293e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A2026171604200AFCB14DF24C895E6ABBE5EF49314F58C49DF45ADB2A2DB31EC46CB52
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetLocalTime.KERNEL32(?), ref: 00B08257
                                                                                                                                                                                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B08267
                                                                                                                                                                                                                                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00B08273
                                                                                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B08310
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00B08324
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00B08356
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00B0838C
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00B08395
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                                                                                              • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                                                              • Opcode ID: de3cdb8654836b73f86b5dc295fee1f6bd0ccfaa41e29daee5188aa75057902d
                                                                                                                                                                                                                                                                              • Instruction ID: 198986e73772ad95b72da495e5d003b7660f7965c019660f1812f7f9b3ddac35
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: de3cdb8654836b73f86b5dc295fee1f6bd0ccfaa41e29daee5188aa75057902d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2E616D725083059FCB10EF60D9409AEB7E8FF89314F04895EF98997261EB31EA45CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A93A97,?,?,00A92E7F,?,?,?,00000000), ref: 00A93AC2
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFE199: GetFileAttributesW.KERNEL32(?,00AFCF95), ref: 00AFE19A
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00AFD122
                                                                                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00AFD1DD
                                                                                                                                                                                                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00AFD1F0
                                                                                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00AFD20D
                                                                                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AFD237
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00AFD21C,?,?), ref: 00AFD2B2
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000,?,?,?), ref: 00AFD253
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00AFD264
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                                                              • String ID: \*.*
                                                                                                                                                                                                                                                                              • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                                                              • Opcode ID: eb6f8f66f3cc326a6cad39c14a537e63720e017da3638352fed4a83441a83f0a
                                                                                                                                                                                                                                                                              • Instruction ID: 31e72696eab7609b5d647cca6efa71633bd80c8e509f85fd08a6a7f59848e52b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: eb6f8f66f3cc326a6cad39c14a537e63720e017da3638352fed4a83441a83f0a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6A615F3190110DAACF16EBE4CA929FEB7B6AF25300F208169F51577191EF315F09DBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1737998785-0
                                                                                                                                                                                                                                                                              • Opcode ID: b1cadc48c6945c7da611a958eb0218091e64f9d97b5f5f621e813995972483e2
                                                                                                                                                                                                                                                                              • Instruction ID: b54176aed825183bee124f1725b5bdd8526aedd094ae3a543ee5c1e1994234c5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b1cadc48c6945c7da611a958eb0218091e64f9d97b5f5f621e813995972483e2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2E418C35204611AFE721DF15D888B19BFE5EF44328F14C599E42A8B6A2CB75EC42CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AF170D
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AF173A
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF16C3: GetLastError.KERNEL32 ref: 00AF174A
                                                                                                                                                                                                                                                                              • ExitWindowsEx.USER32(?,00000000), ref: 00AFE932
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                                                              • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                                                              • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                                                              • Opcode ID: 3540d4c48d1d6d0ce87ce5e006624b7675a94670a2d624906125b59c40f7705e
                                                                                                                                                                                                                                                                              • Instruction ID: 3c6ea49354e3c7acc6e6dde0cbbd119119ed023a8a4c89f91f25c8560b8c478e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3540d4c48d1d6d0ce87ce5e006624b7675a94670a2d624906125b59c40f7705e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4D01D672610219ABEB64A7F49DC6FBFB2AC9B14751F150922FE12E31E1DAE05C4081B4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00B11276
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B11283
                                                                                                                                                                                                                                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00B112BA
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B112C5
                                                                                                                                                                                                                                                                              • closesocket.WSOCK32(00000000), ref: 00B112F4
                                                                                                                                                                                                                                                                              • listen.WSOCK32(00000000,00000005), ref: 00B11303
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B1130D
                                                                                                                                                                                                                                                                              • closesocket.WSOCK32(00000000), ref: 00B1133C
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 540024437-0
                                                                                                                                                                                                                                                                              • Opcode ID: dd64db3388af099e87ec888e6abcd2710a5bc9da7b002824fd237d51e9382ab1
                                                                                                                                                                                                                                                                              • Instruction ID: 5bcab3fbbfba6f59d507ae0b08f90ec112cf6a42eee94885c06645e86e211321
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dd64db3388af099e87ec888e6abcd2710a5bc9da7b002824fd237d51e9382ab1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BB41A2316001409FD720DF28D588B69BBE5EF46318F5884D8D9569F296C771EC82CBE1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACB9D4
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACB9F8
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACBB7F
                                                                                                                                                                                                                                                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00B33700), ref: 00ACBB91
                                                                                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00B6121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00ACBC09
                                                                                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00B61270,000000FF,?,0000003F,00000000,?), ref: 00ACBC36
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACBD4B
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 314583886-0
                                                                                                                                                                                                                                                                              • Opcode ID: 5379b4240e8a4e582472ab64e714bb3576abe85c5f5dfc91b031f134d638382c
                                                                                                                                                                                                                                                                              • Instruction ID: d2ad1a8c8a61986e762de133432be9999cf67259776c3cc801db99f43b985cf4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5379b4240e8a4e582472ab64e714bb3576abe85c5f5dfc91b031f134d638382c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1AC12671914244AFCB20DF788D52FAA7BB8EF45350F1A459EE495DB291EB328E01CB70
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A93A97,?,?,00A92E7F,?,?,?,00000000), ref: 00A93AC2
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFE199: GetFileAttributesW.KERNEL32(?,00AFCF95), ref: 00AFE19A
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00AFD420
                                                                                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00AFD470
                                                                                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AFD481
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00AFD498
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00AFD4A1
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                                                              • String ID: \*.*
                                                                                                                                                                                                                                                                              • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                                                              • Opcode ID: 70ecf7d31dce895e5d8527acff32910c4b991c47e2856664a4c6803d6c85981b
                                                                                                                                                                                                                                                                              • Instruction ID: e4387b14d17468b8fbd372cda641d872e9ee846a84cb9a4d026b20ecbecbfa6e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 70ecf7d31dce895e5d8527acff32910c4b991c47e2856664a4c6803d6c85981b
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8D3182311083459BCB11EF64C9518BF77E8BEA1305F444A1DF5D593191EF30AA09D763
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: __floor_pentium4
                                                                                                                                                                                                                                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                                                                              • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                                                                              • Opcode ID: 263aa3921c8ad15319342f8054a36c56effa784761c0ba71ee71f096ff0353db
                                                                                                                                                                                                                                                                              • Instruction ID: 52afb93618304010dc4b933bfb801ccc8fb9dd67a61b03a91b45c5b9e2a4d8a6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 263aa3921c8ad15319342f8054a36c56effa784761c0ba71ee71f096ff0353db
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 62C21971E086288FDB25CF289D40BEAB7B6EB48315F1641EED44DE7241E775AE818F40
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B064DC
                                                                                                                                                                                                                                                                              • CoInitialize.OLE32(00000000), ref: 00B06639
                                                                                                                                                                                                                                                                              • CoCreateInstance.OLE32(00B2FCF8,00000000,00000001,00B2FB68,?), ref: 00B06650
                                                                                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00B068D4
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                                                              • String ID: .lnk
                                                                                                                                                                                                                                                                              • API String ID: 886957087-24824748
                                                                                                                                                                                                                                                                              • Opcode ID: 6f209b63f8ba8df255e4f822508bd8719aacd97c0cee92f29a2c152e7bb2a68d
                                                                                                                                                                                                                                                                              • Instruction ID: 7d42c5ea19d1b955b95564ccd8f5fa9015a5950a24244b4b79cb4b376245965c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6f209b63f8ba8df255e4f822508bd8719aacd97c0cee92f29a2c152e7bb2a68d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5ED13A71608301AFC714EF24C98196BB7E8FF94704F50896DF5958B2A1EB71ED05CBA2
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetForegroundWindow.USER32(?,?,00000000), ref: 00B122E8
                                                                                                                                                                                                                                                                                • Part of subcall function 00B0E4EC: GetWindowRect.USER32(?,?), ref: 00B0E504
                                                                                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00B12312
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00B12319
                                                                                                                                                                                                                                                                              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00B12355
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00B12381
                                                                                                                                                                                                                                                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B123DF
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2387181109-0
                                                                                                                                                                                                                                                                              • Opcode ID: b6b3d15b70be8516fa692ff6263125ab8dd4e0e790a80cdc3579acae9317af0c
                                                                                                                                                                                                                                                                              • Instruction ID: dfc5d8dc2e1968474235b9a3d3fcfd72412200332857dee33acd23d22d5da060
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b6b3d15b70be8516fa692ff6263125ab8dd4e0e790a80cdc3579acae9317af0c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B6310072504305AFCB20DF54D849BAFBBE9FF88310F400A19F99597191DB34EA59CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00B09B78
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00B09C8B
                                                                                                                                                                                                                                                                                • Part of subcall function 00B03874: GetInputState.USER32 ref: 00B038CB
                                                                                                                                                                                                                                                                                • Part of subcall function 00B03874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B03966
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00B09BA8
                                                                                                                                                                                                                                                                              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00B09C75
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                                                                                              • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                                                              • Opcode ID: 6bc90b56c20048cc8d4ba146024906511e8805fe9e2a48d523f147668358ddec
                                                                                                                                                                                                                                                                              • Instruction ID: 842183d268204f5a793207471b8b2330b80084c086c1b72a4b549dd92f637d3a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6bc90b56c20048cc8d4ba146024906511e8805fe9e2a48d523f147668358ddec
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 91413D71D4420AAFDF24DF64C985AEE7FF8EF15310F248196E805A6192EB309E45CB61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00AA9A4E
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(0000000F), ref: 00AA9B23
                                                                                                                                                                                                                                                                              • SetBkColor.GDI32(?,00000000), ref: 00AA9B36
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Color$LongProcWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3131106179-0
                                                                                                                                                                                                                                                                              • Opcode ID: f5bd576e23a91279341643abc0ec2274eba042f4f44a7aa61e047d88acd8a76c
                                                                                                                                                                                                                                                                              • Instruction ID: 5787534f2153f3605f2a5c368b190b6b0177e16bfae9638bd99a031d4497083b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f5bd576e23a91279341643abc0ec2274eba042f4f44a7aa61e047d88acd8a76c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 94A11770208494BEE728AB2D9C99EBF3AEDDB83380F14450BF506C76D1CB259D02D272
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B1307A
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1304E: _wcslen.LIBCMT ref: 00B1309B
                                                                                                                                                                                                                                                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00B1185D
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B11884
                                                                                                                                                                                                                                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00B118DB
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B118E6
                                                                                                                                                                                                                                                                              • closesocket.WSOCK32(00000000), ref: 00B11915
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1601658205-0
                                                                                                                                                                                                                                                                              • Opcode ID: 591cdee29932dea3c4bea3e7c0564adce78f58434daaba010fe5c6ed7cb2835e
                                                                                                                                                                                                                                                                              • Instruction ID: ecfbce4b2ac21c515f57a8b3a0d28530adce3e0c4ae0448a6ff7767f475520ff
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 591cdee29932dea3c4bea3e7c0564adce78f58434daaba010fe5c6ed7cb2835e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 31519271B002109FDB10AF24C986F6A7BE5AB49718F44C498F9165F2D3D771AD428BA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 292994002-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4e584a9842e1aa53676a5898034318379fd3174ecc0ca8665a29386db656f393
                                                                                                                                                                                                                                                                              • Instruction ID: 6af5fd7ad60e825e076c94f8e0306a92c35569d7e9ffae32ad93470341942827
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4e584a9842e1aa53676a5898034318379fd3174ecc0ca8665a29386db656f393
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9721D6357406205FD7218F1EE884B2A7BE5EFA5314B1984A8E84DCF351CB71EC42CB90
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                                                                              • API String ID: 0-1546025612
                                                                                                                                                                                                                                                                              • Opcode ID: 14c45f5ff2e162dd0ec645aedda6340cc0b784580a801563d9cc02f0ee5dedaa
                                                                                                                                                                                                                                                                              • Instruction ID: 3bc40266e080b675b3b7a0e1608aa58ab0c0b9bd123397ad7be001764ef84fc9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 14c45f5ff2e162dd0ec645aedda6340cc0b784580a801563d9cc02f0ee5dedaa
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E8A26E75E0061ACBDF24CF58C9407AEB7F1BF55314F2481AAE816AB385EB749D81CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00AFAAAC
                                                                                                                                                                                                                                                                              • SetKeyboardState.USER32(00000080), ref: 00AFAAC8
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00AFAB36
                                                                                                                                                                                                                                                                              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00AFAB88
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 432972143-0
                                                                                                                                                                                                                                                                              • Opcode ID: 0db5a6a68f92ae2868211343bde7cf691dc8fbcdc1a24319b85afbe8eab4531e
                                                                                                                                                                                                                                                                              • Instruction ID: 386c8ec85dad802177ee9f7e0eb2f99991c03a880864d10096e5139577c77d5c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0db5a6a68f92ae2868211343bde7cf691dc8fbcdc1a24319b85afbe8eab4531e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4931F6B0A4074CAEFB358BA4CC05BFA7BB6EB64310F04421AF689561D1D7758D85C762
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • InternetReadFile.WININET(?,?,00000400,?), ref: 00B0CE89
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00B0CEEA
                                                                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000000), ref: 00B0CEFE
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 234945975-0
                                                                                                                                                                                                                                                                              • Opcode ID: c0ee8a28e47a9f88b8367073dc97b15f0b2c6e634ac36b41e554b7d1608eaa4d
                                                                                                                                                                                                                                                                              • Instruction ID: e7d96723c198dc83cd745b2da6e56ec1177d95bbf3add676d7f82264ba2cb601
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c0ee8a28e47a9f88b8367073dc97b15f0b2c6e634ac36b41e554b7d1608eaa4d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 02218C715007059BD730DF65C988BAA7FFCEB40354F2046AAE646D2191EB70EE098B54
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00AF82AA
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: lstrlen
                                                                                                                                                                                                                                                                              • String ID: ($|
                                                                                                                                                                                                                                                                              • API String ID: 1659193697-1631851259
                                                                                                                                                                                                                                                                              • Opcode ID: 0edf7c27f84f6329af874015946b51575b7a99ff3f9ff9a8120ba72f9a122c87
                                                                                                                                                                                                                                                                              • Instruction ID: 861979da43f2c15999d99ea5a06bd78bde12f5e6b177ffbf18d51284a3cd320f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0edf7c27f84f6329af874015946b51575b7a99ff3f9ff9a8120ba72f9a122c87
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 65322575A007099FCB28CF59C481A6AB7F0FF48710B15C56EE59ADB3A1EB74E981CB40
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00B05CC1
                                                                                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00B05D17
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(?), ref: 00B05D5F
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3541575487-0
                                                                                                                                                                                                                                                                              • Opcode ID: 0b30519bf9ea82ec754e2d5b5d499cf58adac253b14f06214751f210d88bd17f
                                                                                                                                                                                                                                                                              • Instruction ID: 51ecfe7e65ee2d2787fe7fc7bcd69f93c500eeede75fc828360c7c65eba6efc4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0b30519bf9ea82ec754e2d5b5d499cf58adac253b14f06214751f210d88bd17f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AE518E75604A019FC724CF28C494E9ABBE4FF49314F1486AEE95A8B3A1DB30ED45CF91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • IsDebuggerPresent.KERNEL32 ref: 00AC271A
                                                                                                                                                                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00AC2724
                                                                                                                                                                                                                                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00AC2731
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3906539128-0
                                                                                                                                                                                                                                                                              • Opcode ID: 60bcda2862acfaa156d4fc3b921fe44528e8027dc0f43a42060d249dc6f1c1e1
                                                                                                                                                                                                                                                                              • Instruction ID: 8fc2bcd5904f73ae2ef107f5af6a1479b26ffecb38bdab2b1d9c2da45cf6da9b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 60bcda2862acfaa156d4fc3b921fe44528e8027dc0f43a42060d249dc6f1c1e1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EE31B5749113189BCB21DF64DD89BDDBBB8AF08350F5045EAE41CA7261EB709F818F45
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00B051DA
                                                                                                                                                                                                                                                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B05238
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000), ref: 00B052A1
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1682464887-0
                                                                                                                                                                                                                                                                              • Opcode ID: 14eb2073bcd7af34073501b924e3e74056cc63656fcf3a309b8e76222f4aa06e
                                                                                                                                                                                                                                                                              • Instruction ID: e16a9dc47f9e2fda2e1e806e22afed54f4514bf2ac42394463e2bf57b0b801e2
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 14eb2073bcd7af34073501b924e3e74056cc63656fcf3a309b8e76222f4aa06e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C312C75A00618DFDB10DF54D885EAEBBF5FF49314F048099E809AB3A2DB31E856CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00AB0668
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00AB0685
                                                                                                                                                                                                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AF170D
                                                                                                                                                                                                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AF173A
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00AF174A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 577356006-0
                                                                                                                                                                                                                                                                              • Opcode ID: 7aea065e67dd46fcf429391a8a9efc972c074538a4685714b748e2f31aa2b6cb
                                                                                                                                                                                                                                                                              • Instruction ID: 477b9beae390a17848d078c550be9cd2747842d0034620f0a8fa9f45d3196568
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7aea065e67dd46fcf429391a8a9efc972c074538a4685714b748e2f31aa2b6cb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 371194B1404308EFD718AF94DC86D6BBBB9EB44714B20852EF05657641EB70BC418E64
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00AFD608
                                                                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00AFD645
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00AFD650
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 33631002-0
                                                                                                                                                                                                                                                                              • Opcode ID: 1c81d0c830003bb55dc1c977e2fadc521a5f7b951dfbf68149f5203f6117e249
                                                                                                                                                                                                                                                                              • Instruction ID: a26cf32a97ddc3ddf215ce98050c40f659e0eee321eeb9d2e14981c6f996d471
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1c81d0c830003bb55dc1c977e2fadc521a5f7b951dfbf68149f5203f6117e249
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 68115E75E05228BFDB218F95DC45FAFBFBCEB45B60F108115F904E7290D6704A058BA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00AF168C
                                                                                                                                                                                                                                                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00AF16A1
                                                                                                                                                                                                                                                                              • FreeSid.ADVAPI32(?), ref: 00AF16B1
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3429775523-0
                                                                                                                                                                                                                                                                              • Opcode ID: 51e323f7f256e0d993a34b45c3026bba86fe77c3c441d6d3e0e563f04333327f
                                                                                                                                                                                                                                                                              • Instruction ID: 49c634ff5ce19a5143c71ebd0ff06d3f96da9d0d435d90496cfadf5e45f80465
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 51e323f7f256e0d993a34b45c3026bba86fe77c3c441d6d3e0e563f04333327f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DEF0F47195030DFBDB00DFE49C89EAEBBBCFB08644F504565E501E2181E774AA448A54
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID: /
                                                                                                                                                                                                                                                                              • API String ID: 0-2043925204
                                                                                                                                                                                                                                                                              • Opcode ID: 7520cf88e1a85f8206db2d5e100d17ab7005cdd374907953d374045419d7be7c
                                                                                                                                                                                                                                                                              • Instruction ID: 9ffbe6716ec5c02f706b3ac20910052c4e412583c4bb003bafab6e8065f37af9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7520cf88e1a85f8206db2d5e100d17ab7005cdd374907953d374045419d7be7c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6D412872500219AFCB24AFB9DC49FABB7B8EB84364F11426DF919DB280E6709D41CB54
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetUserNameW.ADVAPI32(?,?), ref: 00AED28C
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: NameUser
                                                                                                                                                                                                                                                                              • String ID: X64
                                                                                                                                                                                                                                                                              • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                                                              • Opcode ID: 51a0e6bccabf12cc0afe59a6e24fa1339f8744e742f73672455df10ab4034d8e
                                                                                                                                                                                                                                                                              • Instruction ID: 3e85d8bf0b3ff4684869b0f80bf9d549aed0768567b92ded7ecfdcbce1278569
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 51a0e6bccabf12cc0afe59a6e24fa1339f8744e742f73672455df10ab4034d8e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8AD0CAB480112DEACBA0CBA0EC88DDEB7BCBB04305F200292F206A2040DB3496498F20
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                                              • Instruction ID: 65ebfe5de142aefeb0afc6ac19fa47e38f4304e82ca5fd07df63b8f775e7cc6c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 08021D71E002199BDF14CFA9C980AEEFBF5EF58324F25416AD819EB341D731AE418B94
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00B06918
                                                                                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00B06961
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2295610775-0
                                                                                                                                                                                                                                                                              • Opcode ID: ff9b5162425b1a091544226df1acc91fce3d0e1801a5b0266c42c9526734bea9
                                                                                                                                                                                                                                                                              • Instruction ID: da21db968fa32a1d014f4ebc1ebec83774256c62ef1f91debc799551d1eac83d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ff9b5162425b1a091544226df1acc91fce3d0e1801a5b0266c42c9526734bea9
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C31190316046019FC710DF29D488A1ABBE5FF89328F14C699F4698F6A2CB30EC05CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00B14891,?,?,00000035,?), ref: 00B037E4
                                                                                                                                                                                                                                                                              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00B14891,?,?,00000035,?), ref: 00B037F4
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3479602957-0
                                                                                                                                                                                                                                                                              • Opcode ID: ea9080272215a73124697342128d541cf9b547adc1830e547fa13b3dd835bae7
                                                                                                                                                                                                                                                                              • Instruction ID: 05de3fb06bbc1e27558e004045ca56aef1d4c23e26d963596a6d9fca212ffc11
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ea9080272215a73124697342128d541cf9b547adc1830e547fa13b3dd835bae7
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F1F0EC707042147AE72057668D4DFDB3EDDDFC8761F000165F505D32C1D9609D04C6B1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00AFB25D
                                                                                                                                                                                                                                                                              • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00AFB270
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3536248340-0
                                                                                                                                                                                                                                                                              • Opcode ID: bc6575de2771facb87062a93ffcf3cf13781847c50fae86705ee2ffbe3f0439b
                                                                                                                                                                                                                                                                              • Instruction ID: 5a5adf3d4065293179fad651f634ac45e7dfd67569c13e4ecad65603a5bdd3d0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bc6575de2771facb87062a93ffcf3cf13781847c50fae86705ee2ffbe3f0439b
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 09F01D7181424DABDF159FA0C806BFE7FB4FF04305F108009F965A61A1C779C6119FA4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00AF11FC), ref: 00AF10D4
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,00AF11FC), ref: 00AF10E9
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 81990902-0
                                                                                                                                                                                                                                                                              • Opcode ID: 31b0e4cd4bce27d2cf2df37e873cefe7e09472415f5e51b8c2a8e233bdefe4c3
                                                                                                                                                                                                                                                                              • Instruction ID: 83dcd22d197645b6521c1c9fb71e3607b357f124796fee16ca179258d389af83
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 31b0e4cd4bce27d2cf2df37e873cefe7e09472415f5e51b8c2a8e233bdefe4c3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 77E04F32004600EEE7362B61FC05E777BE9EB04320B20882DF5A5824B1DF626CA1DB54
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              • Variable is not of type 'Object'., xrefs: 00AE0C40
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID: Variable is not of type 'Object'.
                                                                                                                                                                                                                                                                              • API String ID: 0-1840281001
                                                                                                                                                                                                                                                                              • Opcode ID: af9b6c8eaef18162114e368ca6cf85bd3fbd213a1fe4af651812846b27fe462c
                                                                                                                                                                                                                                                                              • Instruction ID: 2d8b30dfe2e8fb1f94ad320a071873c538d91ff7fc7b3b87924ca74a80fd44e5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: af9b6c8eaef18162114e368ca6cf85bd3fbd213a1fe4af651812846b27fe462c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BB32AA30A00618DFDF14DF94CA84EEDB7F5BF05314F648069E806AB292DB75AE85CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00AC6766,?,?,00000008,?,?,00ACFEFE,00000000), ref: 00AC6998
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ExceptionRaise
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3997070919-0
                                                                                                                                                                                                                                                                              • Opcode ID: d9eb9bcb759180975b02cef5a2e3a34e5ed8f3f59700f4a725f13e2c7f579742
                                                                                                                                                                                                                                                                              • Instruction ID: 1f82632534190941ea016988a6f800a11e30d99b4539730f56837ca9cbc6f7c4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d9eb9bcb759180975b02cef5a2e3a34e5ed8f3f59700f4a725f13e2c7f579742
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 98B108716106099FDB15CF28C48AB657BF0FF45364F26865CE89ACF2A2C735E991CB40
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 0-3916222277
                                                                                                                                                                                                                                                                              • Opcode ID: 8a7d4cf69c850e9c2751bab93b136cb67bed2e5503233581c1d27e0a2defa4a5
                                                                                                                                                                                                                                                                              • Instruction ID: cd4c8bb6d395778810d121fbde70229f53613e37e76430e382c1f725fbb30380
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8a7d4cf69c850e9c2751bab93b136cb67bed2e5503233581c1d27e0a2defa4a5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DB1250759102299FCB14CF59C8806EEB7F5FF49710F14819AE849EB296DB349E81CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • BlockInput.USER32(00000001), ref: 00B0EABD
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: BlockInput
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3456056419-0
                                                                                                                                                                                                                                                                              • Opcode ID: aaa0bf63466efe438ec0abfc4491b1e5049374036010a35f5517d74f3b9501df
                                                                                                                                                                                                                                                                              • Instruction ID: 4e39afa88449cacbba4e09d1fed619b582db282670c971a59270d06af6d23584
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aaa0bf63466efe438ec0abfc4491b1e5049374036010a35f5517d74f3b9501df
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8EE01A323102049FCB10EF59D944E9ABBE9AF98760F008456FC4AC72A1DB70E8418BA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00AB03EE), ref: 00AB09DA
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3192549508-0
                                                                                                                                                                                                                                                                              • Opcode ID: a994967518d12c04829cf788b52e7a720c9a2c49dab2a80b24d4f7760620f857
                                                                                                                                                                                                                                                                              • Instruction ID: 235986aca6b9d8136be9432d10fede6d5f6923c366c1177ce17422dd12de4ab5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a994967518d12c04829cf788b52e7a720c9a2c49dab2a80b24d4f7760620f857
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                                                                              • API String ID: 0-4108050209
                                                                                                                                                                                                                                                                              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                                              • Instruction ID: 3b2f343ba4cf2f58ded69fbf46dc311452d8f040954a02b5b616f4150fa1c396
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8751767160C7055BDB788BB8895EBFE27ED9BC2340F180909D882DB283CAD5DE81D352
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 5ccd54876fa1d9826ef3ae74d350dda1fe4d37f53335b384d1c3b36a5cfd26d5
                                                                                                                                                                                                                                                                              • Instruction ID: ab78ab421f174879ce050b8cdefd77a9a3f4d5ec958c965c31569d13bdd38885
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5ccd54876fa1d9826ef3ae74d350dda1fe4d37f53335b384d1c3b36a5cfd26d5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1D323431D29F014DD7239638DC22339A649AFB73D5F26D73BE81AB69A5EF29C4834500
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: ca3e12aa00a28778d9f1006cf433085b9df5bcfbe80322b42d016e0cc25ff3b4
                                                                                                                                                                                                                                                                              • Instruction ID: bd3cd6d2a0b6a776fcbe107ad16b52abd7c0201444434e3a00b787fcb47d8a8c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ca3e12aa00a28778d9f1006cf433085b9df5bcfbe80322b42d016e0cc25ff3b4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 90322732A042958FEF29CF2AC49067D77B2EB46370F28856AD8599B2D1D734DD83DB40
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 48e8a463bb843e284e47cb1a95af0c5f0f087f3a6344985fd3f0a933d0950e5a
                                                                                                                                                                                                                                                                              • Instruction ID: dba7b535c6067aa09cf5997c163d6cbc4ab7fb9e20f05223176cddb31912a533
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 48e8a463bb843e284e47cb1a95af0c5f0f087f3a6344985fd3f0a933d0950e5a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 442290B0E006099FDF14CFA9D981AAEB7F5FF44300F14452AE816AB391EB35AD15CB60
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: ba52a8d00b74d3b2578ad8cdc1dcd442e1673832169324105fc2a4ae2f5d91ac
                                                                                                                                                                                                                                                                              • Instruction ID: 38c46d167879b46a3ce6c03ec015787e043b056c19cadaa66386e7708be3f986
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ba52a8d00b74d3b2578ad8cdc1dcd442e1673832169324105fc2a4ae2f5d91ac
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4A02A4B1A0020AEFDF05DF54D981AAEB7F5FF44344F10816AE8169F391EB31AA11CB95
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 3fa91b16500437b1fea6d004d4740f8a735228b2f87e536958a3371a984ead76
                                                                                                                                                                                                                                                                              • Instruction ID: be80d3a999722ef06fed787d6c353527be181a8fa5ff94a23537613b90fe5857
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3fa91b16500437b1fea6d004d4740f8a735228b2f87e536958a3371a984ead76
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1AB1D020D2AF404DD3239639887133BB69CAFBB6D5BA2D71BFC1675D22EF2285834140
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                                              • Instruction ID: 829c829d063f5fc4440d383fbee3e865b7a509f714e407d9f3c3315194b2111d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F49178721080E34ADB69473E85740BEFFF95A923A135A079ED4F2CB1C6FE24C964D620
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                                              • Instruction ID: f805889927dfb319140b517df85de54b694e626d4c25dde198994b7f76c6ccf0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BF9164722090E349DB29433D85745BEFFF55A923A131A079FD4F2CA1C7EE248964E720
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                                              • Instruction ID: cefefa9d823a8a53e5f5c9e398bbfc22dd73af7948edfc8321fe05e526d13b62
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 269164722090E34EDB2D437A85740BEFFF95A923A139A079ED4F2CA1C6FE14D564D620
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: b3c34aabbcff2133358eb2229716800000dee08aa1af3318ff70486d95ea2c56
                                                                                                                                                                                                                                                                              • Instruction ID: b2bd5ca53a845b526de8243b8d4f50cc33dc3b248ef82b6597ad32aafe163e20
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b3c34aabbcff2133358eb2229716800000dee08aa1af3318ff70486d95ea2c56
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 23615671208749A6DE749B2C89A5BFE23ACDFC1740F24091EE843DB2C3DAD59E42DB15
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 0768080d392044275a5b8639f02bb2fd45afa520fb87c2bf868e8af916aa20a1
                                                                                                                                                                                                                                                                              • Instruction ID: 0ac196116367b5ffd9117021700017d199690d2557fef996711060a06aa271fc
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0768080d392044275a5b8639f02bb2fd45afa520fb87c2bf868e8af916aa20a1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C461683120870956DE389B2889A1BFF23ACEFC2780F140959E943DF683DAD6DD42DB55
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                                              • Instruction ID: 79ce17b8dc17746370910a56e9e2e1d1926bfedcc1306ecb573b4ec4a6dbe5d4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 328185336080E34ADB2D477A85744BEFFE56A923A135A079DD4F2CB1C3EE24C654E620
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 04356f1893dff58616bd025c466991be4f80f4a140aa3e2549261a15cf4a7fe6
                                                                                                                                                                                                                                                                              • Instruction ID: d67eb48dc97148bf3edc6f3c715240283d7d82fe3f9a05efbbdaba12fc9291d1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 04356f1893dff58616bd025c466991be4f80f4a140aa3e2549261a15cf4a7fe6
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C451489948F7C51FE3139734486A148FFB0EC174583288ACFC9C11658BD782A01ED78B
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 74436a8064f86eb1f44eda3b30e50f34c4da84db732f819ce9c3b2957d644968
                                                                                                                                                                                                                                                                              • Instruction ID: 5abc9b5ece62fb5b20ac3da96033b78effc7a317e5c1e4a34e60a3f9c82f71b4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 74436a8064f86eb1f44eda3b30e50f34c4da84db732f819ce9c3b2957d644968
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4621E7326206118BD728CF79C82367E77E9E754310F14866EE4A7C33D0DE7AA904CB80
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00B12B30
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00B12B43
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32 ref: 00B12B52
                                                                                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00B12B6D
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00B12B74
                                                                                                                                                                                                                                                                              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00B12CA3
                                                                                                                                                                                                                                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00B12CB1
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B12CF8
                                                                                                                                                                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00B12D04
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00B12D40
                                                                                                                                                                                                                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B12D62
                                                                                                                                                                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B12D75
                                                                                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B12D80
                                                                                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00B12D89
                                                                                                                                                                                                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B12D98
                                                                                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00B12DA1
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B12DA8
                                                                                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00B12DB3
                                                                                                                                                                                                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B12DC5
                                                                                                                                                                                                                                                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00B2FC38,00000000), ref: 00B12DDB
                                                                                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00B12DEB
                                                                                                                                                                                                                                                                              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00B12E11
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00B12E30
                                                                                                                                                                                                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B12E52
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B1303F
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                                                              • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                                                              • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                                                              • Opcode ID: 93b19a35e6e0001e0228d0dde406291bcd2daadfecc4fb7850cd3017f136015c
                                                                                                                                                                                                                                                                              • Instruction ID: 859804e9b371ce20bab867da766e35de623c1262784c2d0bf2521b260762a799
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 93b19a35e6e0001e0228d0dde406291bcd2daadfecc4fb7850cd3017f136015c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8D026B71A00204EFDB24DF64CD89EAE7BF9EF48710F148558F916AB2A1DB74AD41CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00B2712F
                                                                                                                                                                                                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00B27160
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(0000000F), ref: 00B2716C
                                                                                                                                                                                                                                                                              • SetBkColor.GDI32(?,000000FF), ref: 00B27186
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,?), ref: 00B27195
                                                                                                                                                                                                                                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00B271C0
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(00000010), ref: 00B271C8
                                                                                                                                                                                                                                                                              • CreateSolidBrush.GDI32(00000000), ref: 00B271CF
                                                                                                                                                                                                                                                                              • FrameRect.USER32(?,?,00000000), ref: 00B271DE
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00B271E5
                                                                                                                                                                                                                                                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00B27230
                                                                                                                                                                                                                                                                              • FillRect.USER32(?,?,?), ref: 00B27262
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B27284
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: GetSysColor.USER32(00000012), ref: 00B27421
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: SetTextColor.GDI32(?,?), ref: 00B27425
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: GetSysColorBrush.USER32(0000000F), ref: 00B2743B
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: GetSysColor.USER32(0000000F), ref: 00B27446
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: GetSysColor.USER32(00000011), ref: 00B27463
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B27471
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: SelectObject.GDI32(?,00000000), ref: 00B27482
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: SetBkColor.GDI32(?,00000000), ref: 00B2748B
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: SelectObject.GDI32(?,?), ref: 00B27498
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00B274B7
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B274CE
                                                                                                                                                                                                                                                                                • Part of subcall function 00B273E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00B274DB
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4124339563-0
                                                                                                                                                                                                                                                                              • Opcode ID: 9d251bbd2d004209aa25f5622b211d37e69fad1c2327171c53785cd0ee758b0c
                                                                                                                                                                                                                                                                              • Instruction ID: 624a9c0e37b4d8935f1f9fdcec051471643c5a02855ff2c17b53e1ab9409ce2c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9d251bbd2d004209aa25f5622b211d37e69fad1c2327171c53785cd0ee758b0c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9DA1BF72008311AFDB209F60DC49A5F7BE9FF49321F100A19F966A71E1DB70E905CB96
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(?,?), ref: 00AA8E14
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00AE6AC5
                                                                                                                                                                                                                                                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00AE6AFE
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00AE6F43
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AA8BE8,?,00000000,?,?,?,?,00AA8BBA,00000000,?), ref: 00AA8FC5
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001053), ref: 00AE6F7F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00AE6F96
                                                                                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00AE6FAC
                                                                                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00AE6FB7
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                                                                              • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                                                              • Opcode ID: 935771dbd9abfb8c0040ce81f2ba5be4c0911d99ebb18cd9ce4db9724a306ef5
                                                                                                                                                                                                                                                                              • Instruction ID: 69333b2455725de7123443917d74b24a16d717920791f6c3e65d8e38742608da
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 935771dbd9abfb8c0040ce81f2ba5be4c0911d99ebb18cd9ce4db9724a306ef5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A012AD30200681DFDB25CF19C994BAABBF5FB65340F184969E485CB2A1CB79EC52CF91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(00000000), ref: 00B1273E
                                                                                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00B1286A
                                                                                                                                                                                                                                                                              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00B128A9
                                                                                                                                                                                                                                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00B128B9
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00B12900
                                                                                                                                                                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00B1290C
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00B12955
                                                                                                                                                                                                                                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B12964
                                                                                                                                                                                                                                                                              • GetStockObject.GDI32(00000011), ref: 00B12974
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00B12978
                                                                                                                                                                                                                                                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00B12988
                                                                                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B12991
                                                                                                                                                                                                                                                                              • DeleteDC.GDI32(00000000), ref: 00B1299A
                                                                                                                                                                                                                                                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B129C6
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B129DD
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00B12A1D
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B12A31
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B12A42
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00B12A77
                                                                                                                                                                                                                                                                              • GetStockObject.GDI32(00000011), ref: 00B12A82
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B12A8D
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00B12A97
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                                                              • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                                                              • Opcode ID: 0134627be451883b1652a82d7b6d9278140b33bd0bdf7a9a5ed205bb50db8a33
                                                                                                                                                                                                                                                                              • Instruction ID: dd7042f67f01446949041d30b145857bd2d19ed1b906fb86b55b9335b20c5e1c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0134627be451883b1652a82d7b6d9278140b33bd0bdf7a9a5ed205bb50db8a33
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F7B14B71A00215AFEB24DF68DD8AEAE7BB9EB08710F004554F915E72E0DB74ED40CBA4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00B04AED
                                                                                                                                                                                                                                                                              • GetDriveTypeW.KERNEL32(?,00B2CB68,?,\\.\,00B2CC08), ref: 00B04BCA
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,00B2CB68,?,\\.\,00B2CC08), ref: 00B04D36
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                                                              • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                                                              • Opcode ID: ccedaa44bd62e3a37606245bef63a419a35a3706bdd3af2f3108bce9b6139125
                                                                                                                                                                                                                                                                              • Instruction ID: 6b7efb67437160b3607d555d705118c773e3b605c1ba0046327837308d571bc5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ccedaa44bd62e3a37606245bef63a419a35a3706bdd3af2f3108bce9b6139125
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D861ADB0705109EBDB24DF24CAC2A6DBBF0EB45301B6485E5FA06AB2E1DB31ED45DB41
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(00000012), ref: 00B27421
                                                                                                                                                                                                                                                                              • SetTextColor.GDI32(?,?), ref: 00B27425
                                                                                                                                                                                                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00B2743B
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(0000000F), ref: 00B27446
                                                                                                                                                                                                                                                                              • CreateSolidBrush.GDI32(?), ref: 00B2744B
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(00000011), ref: 00B27463
                                                                                                                                                                                                                                                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B27471
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,00000000), ref: 00B27482
                                                                                                                                                                                                                                                                              • SetBkColor.GDI32(?,00000000), ref: 00B2748B
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,?), ref: 00B27498
                                                                                                                                                                                                                                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00B274B7
                                                                                                                                                                                                                                                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B274CE
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00B274DB
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B2752A
                                                                                                                                                                                                                                                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B27554
                                                                                                                                                                                                                                                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00B27572
                                                                                                                                                                                                                                                                              • DrawFocusRect.USER32(?,?), ref: 00B2757D
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(00000011), ref: 00B2758E
                                                                                                                                                                                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00B27596
                                                                                                                                                                                                                                                                              • DrawTextW.USER32(?,00B270F5,000000FF,?,00000000), ref: 00B275A8
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,?), ref: 00B275BF
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 00B275CA
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,?), ref: 00B275D0
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 00B275D5
                                                                                                                                                                                                                                                                              • SetTextColor.GDI32(?,?), ref: 00B275DB
                                                                                                                                                                                                                                                                              • SetBkColor.GDI32(?,?), ref: 00B275E5
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1996641542-0
                                                                                                                                                                                                                                                                              • Opcode ID: ca5326028851e30666362039bd448adf107ab1307ebe4b21961779b3d6cb4dde
                                                                                                                                                                                                                                                                              • Instruction ID: ebbaa39e69f842ef8a84f3a5cd88dfdb83686f59c3fcc96d62acbac0f80b98a1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ca5326028851e30666362039bd448adf107ab1307ebe4b21961779b3d6cb4dde
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3E617A72900228AFDF219FA4DC49EAEBFB9EF08321F104155F915BB2A1DB749941CF90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00B21128
                                                                                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00B2113D
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00B21144
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B21199
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00B211B9
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B211ED
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B2120B
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B2121D
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00B21232
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00B21245
                                                                                                                                                                                                                                                                              • IsWindowVisible.USER32(00000000), ref: 00B212A1
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00B212BC
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00B212D0
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00B212E8
                                                                                                                                                                                                                                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00B2130E
                                                                                                                                                                                                                                                                              • GetMonitorInfoW.USER32(00000000,?), ref: 00B21328
                                                                                                                                                                                                                                                                              • CopyRect.USER32(?,?), ref: 00B2133F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000412,00000000), ref: 00B213AA
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                                                              • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                                                              • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                                                              • Opcode ID: 02436ec090496099b64e77d93fe09b88cb6b2d9fbffa8972b1c5ffdfe2e36f0c
                                                                                                                                                                                                                                                                              • Instruction ID: eaf5a1783c0d0ab93ddaf783412d773cbd8b44b02d99749c5ae8b84305638d61
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 02436ec090496099b64e77d93fe09b88cb6b2d9fbffa8972b1c5ffdfe2e36f0c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 76B19C71604350AFDB10DF68D984B6FBBE5FF98340F008958F9999B261CB31E845CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00B202E5
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B2031F
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B20389
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B203F1
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B20475
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B204C5
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B20504
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAF9F2: _wcslen.LIBCMT ref: 00AAF9FD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00AF2258
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00AF228A
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                                                                                                                                                                                              • API String ID: 1103490817-719923060
                                                                                                                                                                                                                                                                              • Opcode ID: 49b0516d57e959796c2f98baaffa37031b7f746e20d6e596081fb2b98ab796b3
                                                                                                                                                                                                                                                                              • Instruction ID: 43ffcbc23e18bb9976878d41389605538a5637b937bd4d5d0afa47f393d544c4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 49b0516d57e959796c2f98baaffa37031b7f746e20d6e596081fb2b98ab796b3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F3E1A0312283118FCB14EF24D69092EB7E6FF98714B14499DF89A9B3A2DB30ED45CB51
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AA8968
                                                                                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000007), ref: 00AA8970
                                                                                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AA899B
                                                                                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000008), ref: 00AA89A3
                                                                                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000004), ref: 00AA89C8
                                                                                                                                                                                                                                                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00AA89E5
                                                                                                                                                                                                                                                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00AA89F5
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00AA8A28
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00AA8A3C
                                                                                                                                                                                                                                                                              • GetClientRect.USER32(00000000,000000FF), ref: 00AA8A5A
                                                                                                                                                                                                                                                                              • GetStockObject.GDI32(00000011), ref: 00AA8A76
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AA8A81
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA912D: GetCursorPos.USER32(?), ref: 00AA9141
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA912D: ScreenToClient.USER32(00000000,?), ref: 00AA915E
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA912D: GetAsyncKeyState.USER32(00000001), ref: 00AA9183
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA912D: GetAsyncKeyState.USER32(00000002), ref: 00AA919D
                                                                                                                                                                                                                                                                              • SetTimer.USER32(00000000,00000000,00000028,00AA90FC), ref: 00AA8AA8
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                                                              • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                                                              • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                                                              • Opcode ID: 87224fa12d666fef49bdfe032261ef20957dcfd1c1cacf935f80db3fbed1b2ea
                                                                                                                                                                                                                                                                              • Instruction ID: a8cece5344b67ec2192a0be3906eecdcdf80661213b742b6ec44be68597bb45f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 87224fa12d666fef49bdfe032261ef20957dcfd1c1cacf935f80db3fbed1b2ea
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 13B17A31A00209AFDB24DFA8CD46BAE3BB5FB48354F144629FA15E72D0DB78E841CB50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AF1114
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF1120
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF112F
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF1136
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AF114D
                                                                                                                                                                                                                                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00AF0DF5
                                                                                                                                                                                                                                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00AF0E29
                                                                                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00AF0E40
                                                                                                                                                                                                                                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00AF0E7A
                                                                                                                                                                                                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00AF0E96
                                                                                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00AF0EAD
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00AF0EB5
                                                                                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00AF0EBC
                                                                                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00AF0EDD
                                                                                                                                                                                                                                                                              • CopySid.ADVAPI32(00000000), ref: 00AF0EE4
                                                                                                                                                                                                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00AF0F13
                                                                                                                                                                                                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00AF0F35
                                                                                                                                                                                                                                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00AF0F47
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AF0F6E
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF0F75
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AF0F7E
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF0F85
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AF0F8E
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF0F95
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00AF0FA1
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF0FA8
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1193: GetProcessHeap.KERNEL32(00000008,00AF0BB1,?,00000000,?,00AF0BB1,?), ref: 00AF11A1
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00AF0BB1,?), ref: 00AF11A8
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00AF0BB1,?), ref: 00AF11B7
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4175595110-0
                                                                                                                                                                                                                                                                              • Opcode ID: abace7cf9204575559aa714899a21c77db2e153b25ca28fb8acf73e0c2e80918
                                                                                                                                                                                                                                                                              • Instruction ID: c51e6bca1ea5e6f3f0347f34592afa1dace7440cfa17ad9a807ff7531f25cecd
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: abace7cf9204575559aa714899a21c77db2e153b25ca28fb8acf73e0c2e80918
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A0715B7290020AEBDB209FE4DD45FBEBBB8BF04341F144115FA19E7192DB359916CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B1C4BD
                                                                                                                                                                                                                                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B2CC08,00000000,?,00000000,?,?), ref: 00B1C544
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00B1C5A4
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B1C5F4
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B1C66F
                                                                                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00B1C6B2
                                                                                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00B1C7C1
                                                                                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00B1C84D
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00B1C881
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00B1C88E
                                                                                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00B1C960
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                                                              • API String ID: 9721498-966354055
                                                                                                                                                                                                                                                                              • Opcode ID: a1de779bbf48607765acf1b287f11c9ac182b696aaa8630ee6f20058ad2e409e
                                                                                                                                                                                                                                                                              • Instruction ID: a2fa2215ab1e63aff45277fb062c6e52809bf933590c5e043a28d01cce9a06bb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a1de779bbf48607765acf1b287f11c9ac182b696aaa8630ee6f20058ad2e409e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 65126A357082019FDB14DF24C981A6ABBE5FF88714F15889CF85A9B3A2DB31ED41CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00B209C6
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B20A01
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B20A54
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B20A8A
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B20B06
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B20B81
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAF9F2: _wcslen.LIBCMT ref: 00AAF9FD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00AF2BFA
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                                                              • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                                                              • Opcode ID: cd302784f99f4df9457c2cf3b10b913e6e917ea76df4a26a1d8ed404a027f582
                                                                                                                                                                                                                                                                              • Instruction ID: dab40fd96435eded2e838c9c947efd44ea7a11d49f7be97ae94a74cd4e94c175
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cd302784f99f4df9457c2cf3b10b913e6e917ea76df4a26a1d8ed404a027f582
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 97E19D322183118FCB14EF24D59092AB7E1FF99354F54899CF89A9B3A2DB30ED45CB81
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                                                              • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                                                              • Opcode ID: 07be5769ea68262d2ae7e2a4eed76020200aa236e965c983a0c4c8a227fd02cd
                                                                                                                                                                                                                                                                              • Instruction ID: f6f31d503ace9cdde7479e75d488c8dd0b0998cca91d1d26542cf22657a0b6b7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 07be5769ea68262d2ae7e2a4eed76020200aa236e965c983a0c4c8a227fd02cd
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4371F43369412A8BCB20DE6C99416FF3BD5EF65750FA005A8FC6697289EA30CDC5C390
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B2835A
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B2836E
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B28391
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B283B4
                                                                                                                                                                                                                                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B283F2
                                                                                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00B25BF2), ref: 00B2844E
                                                                                                                                                                                                                                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B28487
                                                                                                                                                                                                                                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00B284CA
                                                                                                                                                                                                                                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B28501
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(?), ref: 00B2850D
                                                                                                                                                                                                                                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B2851D
                                                                                                                                                                                                                                                                              • DestroyIcon.USER32(?,?,?,?,?,00B25BF2), ref: 00B2852C
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B28549
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B28555
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                                                              • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                                                              • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                                                              • Opcode ID: 2be3177f6a0ecc90404e8fb973ba7b0cdf706d3c49867c4fd83c9e6ea2253beb
                                                                                                                                                                                                                                                                              • Instruction ID: 981dce82dcd13807536a9aba337afb9b893c3f07f3caf6160d03da18751503a0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2be3177f6a0ecc90404e8fb973ba7b0cdf706d3c49867c4fd83c9e6ea2253beb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0C61CE71500225BAEB24DF64DC82BFE7BA8FF18B11F104589F819D61D1DF74A980CBA0
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                                                                              • API String ID: 0-1645009161
                                                                                                                                                                                                                                                                              • Opcode ID: de96ea0e593418929e4fea11b4419bc2e4d38836872b18770e520ed01e2902fc
                                                                                                                                                                                                                                                                              • Instruction ID: 179279f592fa1033e90038435568a6d5f75efc4523ac78bc1bfd2864989d03a9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: de96ea0e593418929e4fea11b4419bc2e4d38836872b18770e520ed01e2902fc
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5881FE71B10605BBDF24AFA4DD42FEE3BF9AF15300F044065F909AB292EB70DA15C6A1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CharLowerBuffW.USER32(?,?), ref: 00B03EF8
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B03F03
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B03F5A
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B03F98
                                                                                                                                                                                                                                                                              • GetDriveTypeW.KERNEL32(?), ref: 00B03FD6
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B0401E
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B04059
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B04087
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                                                              • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                                                              • Opcode ID: a0c4ed58e751009d7ea3332f0a01991df69f9b776f92759bf12fa1aac55bef4a
                                                                                                                                                                                                                                                                              • Instruction ID: add5efcae77be09141de04044692b5316bee4c29eb5cef47f040447b44c5a1a2
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a0c4ed58e751009d7ea3332f0a01991df69f9b776f92759bf12fa1aac55bef4a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BB71D3726042029FC710EF24C98196FBBF8EF94754F4049ADF996972A1EB30ED49CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadIconW.USER32(00000063), ref: 00AF5A2E
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00AF5A40
                                                                                                                                                                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00AF5A57
                                                                                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00AF5A6C
                                                                                                                                                                                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00AF5A72
                                                                                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00AF5A82
                                                                                                                                                                                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00AF5A88
                                                                                                                                                                                                                                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00AF5AA9
                                                                                                                                                                                                                                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00AF5AC3
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00AF5ACC
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AF5B33
                                                                                                                                                                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00AF5B6F
                                                                                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00AF5B75
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00AF5B7C
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00AF5BD3
                                                                                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00AF5BE0
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000005,00000000,?), ref: 00AF5C05
                                                                                                                                                                                                                                                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00AF5C2F
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 895679908-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8ab78764a196d3c040d6fd80e512e45e5d4e6731c0cadffe97a0fee154cba21b
                                                                                                                                                                                                                                                                              • Instruction ID: 541a16dfb35509c03adde16877980c5d50d182fbd86d97b87415838e688c835d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8ab78764a196d3c040d6fd80e512e45e5d4e6731c0cadffe97a0fee154cba21b
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F4713B31900A09AFDB21DFB8CE89AAEBBF5FF48704F104518F646A35A0DB75E945CB50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F89), ref: 00B0FE27
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00B0FE32
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00B0FE3D
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F03), ref: 00B0FE48
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00B0FE53
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F01), ref: 00B0FE5E
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F81), ref: 00B0FE69
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F88), ref: 00B0FE74
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F80), ref: 00B0FE7F
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 00B0FE8A
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F83), ref: 00B0FE95
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F85), ref: 00B0FEA0
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F82), ref: 00B0FEAB
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F84), ref: 00B0FEB6
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F04), ref: 00B0FEC1
                                                                                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00B0FECC
                                                                                                                                                                                                                                                                              • GetCursorInfo.USER32(?), ref: 00B0FEDC
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00B0FF1E
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3215588206-0
                                                                                                                                                                                                                                                                              • Opcode ID: e8fd50e05bd586d087fb83dc5b988b0d0c352e3ee279614959fe3da4152785dd
                                                                                                                                                                                                                                                                              • Instruction ID: 23480679841cf7f5ac0c3a34705acbfa71835fbb4b1b603658a8fe8093838ad0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e8fd50e05bd586d087fb83dc5b988b0d0c352e3ee279614959fe3da4152785dd
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EE4175B0E0531A6ADB20DFB68C8586EBFE8FF04754B50456AE11DE7281DB78A901CE91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00AB00C6
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00B6070C,00000FA0,0BFF2BC7,?,?,?,?,00AD23B3,000000FF), ref: 00AB011C
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00AD23B3,000000FF), ref: 00AB0127
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00AD23B3,000000FF), ref: 00AB0138
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00AB014E
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00AB015C
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00AB016A
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00AB0195
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00AB01A0
                                                                                                                                                                                                                                                                              • ___scrt_fastfail.LIBCMT ref: 00AB00E7
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00A3: __onexit.LIBCMT ref: 00AB00A9
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              • SleepConditionVariableCS, xrefs: 00AB0154
                                                                                                                                                                                                                                                                              • InitializeConditionVariable, xrefs: 00AB0148
                                                                                                                                                                                                                                                                              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00AB0122
                                                                                                                                                                                                                                                                              • WakeAllConditionVariable, xrefs: 00AB0162
                                                                                                                                                                                                                                                                              • kernel32.dll, xrefs: 00AB0133
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                                                              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                                                              • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                                                              • Opcode ID: a8716e44c1504f379a9c781c9bdd63bc3fffcc913b6258943eeb36e0f04b9d0b
                                                                                                                                                                                                                                                                              • Instruction ID: 5a015c31cac435a3db87cf74dce3d696b5ee202fb736c377aab7aedda589b1ca
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a8716e44c1504f379a9c781c9bdd63bc3fffcc913b6258943eeb36e0f04b9d0b
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3421A732A447116BD7246BA8BD06FBF77E8EF05B91F000675F805A72E2DFB49C008A90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen
                                                                                                                                                                                                                                                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                                                                                              • API String ID: 176396367-1603158881
                                                                                                                                                                                                                                                                              • Opcode ID: 193f38b79d22011de6071d18898abf37c2c8521096a13d89382e294fe7d19ff1
                                                                                                                                                                                                                                                                              • Instruction ID: 3d4276b254e4354327e880c447ef8ffe510d5d8336ac6a3e3f3e65d74e8ccbe6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 193f38b79d22011de6071d18898abf37c2c8521096a13d89382e294fe7d19ff1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 29E1C333A0051AAACF14DFF8C8517FEBBB4BF54751F148259FA56A7240DB30AE858790
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CharLowerBuffW.USER32(00000000,00000000,00B2CC08), ref: 00B04527
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B0453B
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B04599
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B045F4
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B0463F
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B046A7
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAF9F2: _wcslen.LIBCMT ref: 00AAF9FD
                                                                                                                                                                                                                                                                              • GetDriveTypeW.KERNEL32(?,00B56BF0,00000061), ref: 00B04743
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                                                              • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                                                              • Opcode ID: 745732c1181fe3af646db245253ff1547dcfb2944e7374418dafa20ea900a153
                                                                                                                                                                                                                                                                              • Instruction ID: 87c735e41214bbe597ef5af9a82c680758b0fb8d2f17962200a054300a5f61bd
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 745732c1181fe3af646db245253ff1547dcfb2944e7374418dafa20ea900a153
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F6B1E0B16083029FC710DF28C991A6ABBE5EFA5760F50899DF696C72D1E730DC44CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00B2CC08), ref: 00B140BB
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00B140CD
                                                                                                                                                                                                                                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00B2CC08), ref: 00B140F2
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,00B2CC08), ref: 00B1413E
                                                                                                                                                                                                                                                                              • StringFromGUID2.OLE32(?,?,00000028,?,00B2CC08), ref: 00B141A8
                                                                                                                                                                                                                                                                              • SysFreeString.OLEAUT32(00000009), ref: 00B14262
                                                                                                                                                                                                                                                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00B142C8
                                                                                                                                                                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 00B142F2
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                                                              • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                                                              • API String ID: 354098117-199464113
                                                                                                                                                                                                                                                                              • Opcode ID: f84b0e99bd9c040e0a2f8ed8aef51a845b78e336ab89d121c546eea56c524ef1
                                                                                                                                                                                                                                                                              • Instruction ID: f492bb2701d4db9f1e164a752e0ea7e34ead8cbf4dbdf5338fc8cee50c9c557c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f84b0e99bd9c040e0a2f8ed8aef51a845b78e336ab89d121c546eea56c524ef1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9C123B75A00119EFDB14DF94C884EAEBBF5FF49314F648098E905AB251DB31ED86CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetMenuItemCount.USER32(00B61990), ref: 00AD2F8D
                                                                                                                                                                                                                                                                              • GetMenuItemCount.USER32(00B61990), ref: 00AD303D
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00AD3081
                                                                                                                                                                                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00AD308A
                                                                                                                                                                                                                                                                              • TrackPopupMenuEx.USER32(00B61990,00000000,?,00000000,00000000,00000000), ref: 00AD309D
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00AD30A9
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                                                                              • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                                                              • Opcode ID: db526a19fda5cc71f0206649c1b30551cc294deb05b2b5dbc462ef77cc51dcfb
                                                                                                                                                                                                                                                                              • Instruction ID: 083be5740ae228bfe67204bfa65e7e040b844c50c6fa19e45559bdbec0e8867f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: db526a19fda5cc71f0206649c1b30551cc294deb05b2b5dbc462ef77cc51dcfb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C8711871644205BEEF218F64CD49FAABFB4FF15364F204217F5256A2E0CBB1A910DB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(00000000,?), ref: 00B26DEB
                                                                                                                                                                                                                                                                                • Part of subcall function 00A96B57: _wcslen.LIBCMT ref: 00A96B6A
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B26E5F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B26E81
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B26E94
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00B26EB5
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00A90000,00000000), ref: 00B26EE4
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B26EFD
                                                                                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00B26F16
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00B26F1D
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B26F35
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B26F4D
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9944: GetWindowLongW.USER32(?,000000EB), ref: 00AA9952
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                                                              • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                                                              • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                                                              • Opcode ID: 140d56d5b45f7a14929441c4f187dea77b47e73ce2fc05e97a0cbcc76d0290af
                                                                                                                                                                                                                                                                              • Instruction ID: baf82b01dac4360518a918c0ff9d2207d52856beaf214710c1d8f9f834237e69
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 140d56d5b45f7a14929441c4f187dea77b47e73ce2fc05e97a0cbcc76d0290af
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3C716774104244AFDB21DF18EC48FAABBF9FB89304F14085DF989972A1DB70A906CF11
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              • DragQueryPoint.SHELL32(?,?), ref: 00B29147
                                                                                                                                                                                                                                                                                • Part of subcall function 00B27674: ClientToScreen.USER32(?,?), ref: 00B2769A
                                                                                                                                                                                                                                                                                • Part of subcall function 00B27674: GetWindowRect.USER32(?,?), ref: 00B27710
                                                                                                                                                                                                                                                                                • Part of subcall function 00B27674: PtInRect.USER32(?,?,00B28B89), ref: 00B27720
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00B291B0
                                                                                                                                                                                                                                                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B291BB
                                                                                                                                                                                                                                                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B291DE
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B29225
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00B2923E
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00B29255
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00B29277
                                                                                                                                                                                                                                                                              • DragFinish.SHELL32(?), ref: 00B2927E
                                                                                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B29371
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                                                                                              • API String ID: 221274066-3440237614
                                                                                                                                                                                                                                                                              • Opcode ID: 329379c05db58a4e4af87824250e4a89a4775857f4ac49951fa9861627c97aee
                                                                                                                                                                                                                                                                              • Instruction ID: 91b24acb8106c60f903cfaacfdfaa105afa146249580b88b34a4d409d2fc1d2a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 329379c05db58a4e4af87824250e4a89a4775857f4ac49951fa9861627c97aee
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 45617B71108301AFD701EF64DD85DAFBBE8EF98750F00095EF599931A1DB709A49CBA2
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B0C4B0
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00B0C4C3
                                                                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00B0C4D7
                                                                                                                                                                                                                                                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00B0C4F0
                                                                                                                                                                                                                                                                              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00B0C533
                                                                                                                                                                                                                                                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00B0C549
                                                                                                                                                                                                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B0C554
                                                                                                                                                                                                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B0C584
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00B0C5DC
                                                                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00B0C5F0
                                                                                                                                                                                                                                                                              • InternetCloseHandle.WININET(00000000), ref: 00B0C5FB
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                                                              • Opcode ID: 6e2a96abc11ce23cc7a897b70890473a034279892a20e88df291f0f64d70a40e
                                                                                                                                                                                                                                                                              • Instruction ID: 38e4f608c6714dba6b9a689c197659f022d4712f3aa1e879faece4a5a1f036bb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6e2a96abc11ce23cc7a897b70890473a034279892a20e88df291f0f64d70a40e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4D515AB4500608BFEB218F60CD89AAB7FFCFF18754F004659F94697290DB34E9459BA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00B28592
                                                                                                                                                                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B285A2
                                                                                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B285AD
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B285BA
                                                                                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00B285C8
                                                                                                                                                                                                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B285D7
                                                                                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00B285E0
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B285E7
                                                                                                                                                                                                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B285F8
                                                                                                                                                                                                                                                                              • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00B2FC38,?), ref: 00B28611
                                                                                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00B28621
                                                                                                                                                                                                                                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00B28641
                                                                                                                                                                                                                                                                              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00B28671
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 00B28699
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00B286AF
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3840717409-0
                                                                                                                                                                                                                                                                              • Opcode ID: 0b2d4045167e5b69912dd8dbda1e454298f8b18d23a79db31776de7168aa2ae5
                                                                                                                                                                                                                                                                              • Instruction ID: 636a0ad8add8bee9f9e171241c4a0159eef8fb6eecb35411428d1400e91fc270
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0b2d4045167e5b69912dd8dbda1e454298f8b18d23a79db31776de7168aa2ae5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5E41F975601214AFDB21DFA5DC88EAE7BB8EF99711F104558F909E7260DB30A902CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(00000000), ref: 00B01502
                                                                                                                                                                                                                                                                              • VariantCopy.OLEAUT32(?,?), ref: 00B0150B
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00B01517
                                                                                                                                                                                                                                                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00B015FB
                                                                                                                                                                                                                                                                              • VarR8FromDec.OLEAUT32(?,?), ref: 00B01657
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00B01708
                                                                                                                                                                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 00B0178C
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00B017D8
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00B017E7
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(00000000), ref: 00B01823
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                                                                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                                                                              • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                                                                              • Opcode ID: 91a4be3d560b7a6d4b07b177ff7c307a7c259ad5ad955eea4850eda783103033
                                                                                                                                                                                                                                                                              • Instruction ID: 327d79e931e98da4fff50d041d7086d4891e1a0593b8a0b97aa0d0e60519ab71
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 91a4be3d560b7a6d4b07b177ff7c307a7c259ad5ad955eea4850eda783103033
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1AD1CE71A00615EBDB18AF69D885B6DBBF5FF55700F10889AE406AF2C0DB30EC45DBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B1B6AE,?,?), ref: 00B1C9B5
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1C9F1
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1CA68
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1CA9E
                                                                                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B1B6F4
                                                                                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B1B772
                                                                                                                                                                                                                                                                              • RegDeleteValueW.ADVAPI32(?,?), ref: 00B1B80A
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00B1B87E
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00B1B89C
                                                                                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00B1B8F2
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B1B904
                                                                                                                                                                                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B1B922
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00B1B983
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00B1B994
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                                              • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                                                              • Opcode ID: f8f1d84f0975e3509bccc5f494fc9c4d7da4989b4a3355ba84d0fd63385eb160
                                                                                                                                                                                                                                                                              • Instruction ID: 6e0cb6f36693275daf18fd7b311bfe98baccd30062050f1f2cef49b6b418650c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f8f1d84f0975e3509bccc5f494fc9c4d7da4989b4a3355ba84d0fd63385eb160
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C9C17F31208201AFDB14DF14C495F6ABBE5FF84318F54859CF49A8B2A2CB71ED86CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00B125D8
                                                                                                                                                                                                                                                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00B125E8
                                                                                                                                                                                                                                                                              • CreateCompatibleDC.GDI32(?), ref: 00B125F4
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(00000000,?), ref: 00B12601
                                                                                                                                                                                                                                                                              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00B1266D
                                                                                                                                                                                                                                                                              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00B126AC
                                                                                                                                                                                                                                                                              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00B126D0
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,?), ref: 00B126D8
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 00B126E1
                                                                                                                                                                                                                                                                              • DeleteDC.GDI32(?), ref: 00B126E8
                                                                                                                                                                                                                                                                              • ReleaseDC.USER32(00000000,?), ref: 00B126F3
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                                                              • String ID: (
                                                                                                                                                                                                                                                                              • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                                                              • Opcode ID: a41406fe644970b3be44cf900291ca35ae9f9d00fc6c25037f8d8882f1269896
                                                                                                                                                                                                                                                                              • Instruction ID: 647d20cbb7ace01aa3fd9a2b0c5490f14d9aac65707f8543651c77912437a01b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a41406fe644970b3be44cf900291ca35ae9f9d00fc6c25037f8d8882f1269896
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D161F175D00219EFCF14CFA8D885AAEBBF6FF48310F208569E955A7250D770A951CFA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • ___free_lconv_mon.LIBCMT ref: 00ACDAA1
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD659
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD66B
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD67D
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD68F
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD6A1
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD6B3
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD6C5
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD6D7
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD6E9
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD6FB
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD70D
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD71F
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD63C: _free.LIBCMT ref: 00ACD731
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDA96
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000), ref: 00AC29DE
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: GetLastError.KERNEL32(00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000,00000000), ref: 00AC29F0
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDAB8
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDACD
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDAD8
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDAFA
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDB0D
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDB1B
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDB26
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDB5E
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDB65
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDB82
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACDB9A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 161543041-0
                                                                                                                                                                                                                                                                              • Opcode ID: 342919a22e81fa5cf534402f3b8e3001397c079d7cf93edd670e55e255d5f551
                                                                                                                                                                                                                                                                              • Instruction ID: f0713f8662ae76a99e5cd3c5ec5e81fe005a124b74fcb925ce7f1a3e096ae05b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 342919a22e81fa5cf534402f3b8e3001397c079d7cf93edd670e55e255d5f551
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C93116326047059FEB22AB39E945F6ABBE9FF40351F16442DE449EB191DE31AC80CB20
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00AF369C
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AF36A7
                                                                                                                                                                                                                                                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00AF3797
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00AF380C
                                                                                                                                                                                                                                                                              • GetDlgCtrlID.USER32(?), ref: 00AF385D
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00AF3882
                                                                                                                                                                                                                                                                              • GetParent.USER32(?), ref: 00AF38A0
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(00000000), ref: 00AF38A7
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00AF3921
                                                                                                                                                                                                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00AF395D
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                                                                              • String ID: %s%u
                                                                                                                                                                                                                                                                              • API String ID: 4010501982-679674701
                                                                                                                                                                                                                                                                              • Opcode ID: 2a54f03684e7f6f5d2e527369ba10847c70a4cd2f33c3abef7021ddefb87134e
                                                                                                                                                                                                                                                                              • Instruction ID: f6972422230e2032c4a4c7f0ccdcf4162c59c5d61eaf4e93292b1306e7c36b9d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2a54f03684e7f6f5d2e527369ba10847c70a4cd2f33c3abef7021ddefb87134e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0991B57220460AAFDB15DFA4C895BFAF7A8FF44350F004619FA99D3150DB70EA45CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00AF4994
                                                                                                                                                                                                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00AF49DA
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AF49EB
                                                                                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,00000000), ref: 00AF49F7
                                                                                                                                                                                                                                                                              • _wcsstr.LIBVCRUNTIME ref: 00AF4A2C
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00AF4A64
                                                                                                                                                                                                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00AF4A9D
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00AF4AE6
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00AF4B20
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00AF4B8B
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                                                              • String ID: ThumbnailClass
                                                                                                                                                                                                                                                                              • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                                                              • Opcode ID: a6d0f0812c65486e6cdcb3775bda0ad14ffecd05d9fcdcbba0572ca77144ea68
                                                                                                                                                                                                                                                                              • Instruction ID: 49b96dff7bfe08b266e29463f236f00ec6200eecdb52cc6aa75dc0838e6b5ba5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a6d0f0812c65486e6cdcb3775bda0ad14ffecd05d9fcdcbba0572ca77144ea68
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E2919A711042099FDB15DF94C981BBB7BE8FF88354F04846AFE859A096DB30ED46CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B28D5A
                                                                                                                                                                                                                                                                              • GetFocus.USER32 ref: 00B28D6A
                                                                                                                                                                                                                                                                              • GetDlgCtrlID.USER32(00000000), ref: 00B28D75
                                                                                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00B28E1D
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00B28ECF
                                                                                                                                                                                                                                                                              • GetMenuItemCount.USER32(?), ref: 00B28EEC
                                                                                                                                                                                                                                                                              • GetMenuItemID.USER32(?,00000000), ref: 00B28EFC
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00B28F2E
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00B28F70
                                                                                                                                                                                                                                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B28FA1
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                                                                              • API String ID: 1026556194-4108050209
                                                                                                                                                                                                                                                                              • Opcode ID: c119140aabd17884591d13f4e7a0d0cd1777094f2cb3944c915c07f7c08ff764
                                                                                                                                                                                                                                                                              • Instruction ID: 02dc637d14f54ca004a692e1864b0a228ebdd199e0f3f6527e69834c1a4eb6f0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c119140aabd17884591d13f4e7a0d0cd1777094f2cb3944c915c07f7c08ff764
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5081D0715093219FDB20DF24E984AAB7BE9FF88354F0409ADF98897291DF70D905CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00AFDC20
                                                                                                                                                                                                                                                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00AFDC46
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFDC50
                                                                                                                                                                                                                                                                              • _wcsstr.LIBVCRUNTIME ref: 00AFDCA0
                                                                                                                                                                                                                                                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00AFDCBC
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                                                                                                                                                                                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                                                                                                                                                                              • API String ID: 1939486746-1459072770
                                                                                                                                                                                                                                                                              • Opcode ID: 467eee60b213e366629ef8ccd213bedf587431787af1de2f19fb6550e0ca55e2
                                                                                                                                                                                                                                                                              • Instruction ID: 60151e902ce054e8dc44204118481bea3958efb86ae4ab064afb530b9f5f550a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 467eee60b213e366629ef8ccd213bedf587431787af1de2f19fb6550e0ca55e2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A44118329402187EEB25A7B4DD47EFF77ACEF56710F1001A9FA00A7193EB749A0197A4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00B1CC64
                                                                                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00B1CC8D
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00B1CD48
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00B1CCAA
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00B1CCBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B1CCCF
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00B1CD05
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00B1CD28
                                                                                                                                                                                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B1CCF3
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                                              • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                                                              • Opcode ID: 2778296b6ffa4eaefed563c6c2ee6011ce126b3c1109489eb45c6719638ce781
                                                                                                                                                                                                                                                                              • Instruction ID: ab2a7dc87c09f599d1a2450f22661a287825cc96b33a398440844f8d4653aea7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2778296b6ffa4eaefed563c6c2ee6011ce126b3c1109489eb45c6719638ce781
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F7315C71941129BBDB208B55DC88EFFBFBCEF55750F0001A5A905E3250DB749E86DAE0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B03D40
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B03D6D
                                                                                                                                                                                                                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B03D9D
                                                                                                                                                                                                                                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00B03DBE
                                                                                                                                                                                                                                                                              • RemoveDirectoryW.KERNEL32(?), ref: 00B03DCE
                                                                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00B03E55
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00B03E60
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00B03E6B
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                                                              • String ID: :$\$\??\%s
                                                                                                                                                                                                                                                                              • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                                                              • Opcode ID: 03b3d3cc85bef06265ac67121cab2c19ae76310cb3d62074765087e9a2b13e8d
                                                                                                                                                                                                                                                                              • Instruction ID: c14e2fb23a1b109614c3ac0c5a7b678f6408df845dbf2b92a8c4d43939f2f1fe
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 03b3d3cc85bef06265ac67121cab2c19ae76310cb3d62074765087e9a2b13e8d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A1316E71900209AADB219FA0DC49FEF3BFCEF89B40F1041B6F505D61A1EB7497458B24
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • timeGetTime.WINMM ref: 00AFE6B4
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAE551: timeGetTime.WINMM(?,?,00AFE6D4), ref: 00AAE555
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(0000000A), ref: 00AFE6E1
                                                                                                                                                                                                                                                                              • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00AFE705
                                                                                                                                                                                                                                                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00AFE727
                                                                                                                                                                                                                                                                              • SetActiveWindow.USER32 ref: 00AFE746
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00AFE754
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00AFE773
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(000000FA), ref: 00AFE77E
                                                                                                                                                                                                                                                                              • IsWindow.USER32 ref: 00AFE78A
                                                                                                                                                                                                                                                                              • EndDialog.USER32(00000000), ref: 00AFE79B
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                                                              • String ID: BUTTON
                                                                                                                                                                                                                                                                              • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                                                              • Opcode ID: fa5bf093ffaaef6121d01c24d659599c1f0ab68fc94af5132b7a278eac7328c6
                                                                                                                                                                                                                                                                              • Instruction ID: 50583f978b2f16673803176d44dafbb93c10ddcbb09647ec3aa57419e2aafc82
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fa5bf093ffaaef6121d01c24d659599c1f0ab68fc94af5132b7a278eac7328c6
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0C216270200609AFFB11AFA5EC8DA393F69F754749B100825F616C31F1DFB59C219B24
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00AFEA5D
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00AFEA73
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AFEA84
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00AFEA96
                                                                                                                                                                                                                                                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00AFEAA7
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: SendString$_wcslen
                                                                                                                                                                                                                                                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                                                              • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                                                              • Opcode ID: d3d53821b60f06323cc7d458543310aa37f23240a5d6df5a14ede2c74c89263a
                                                                                                                                                                                                                                                                              • Instruction ID: b756840e34f8bc6b3c163cc46a62e0b5a8e08acf4a77c31cb28a28ff57ba613a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d3d53821b60f06323cc7d458543310aa37f23240a5d6df5a14ede2c74c89263a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 89118F31A9021979DB20F7A1DD4AEFF6BBCEBD5F41F4004A97801A30E0EA700909C5B0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetKeyboardState.USER32(?), ref: 00AFA012
                                                                                                                                                                                                                                                                              • SetKeyboardState.USER32(?), ref: 00AFA07D
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00AFA09D
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(000000A0), ref: 00AFA0B4
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(000000A1), ref: 00AFA0E3
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(000000A1), ref: 00AFA0F4
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000011), ref: 00AFA120
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(00000011), ref: 00AFA12E
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000012), ref: 00AFA157
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(00000012), ref: 00AFA165
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00AFA18E
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(0000005B), ref: 00AFA19C
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 541375521-0
                                                                                                                                                                                                                                                                              • Opcode ID: e62d713bac80f185a3c5432f6249951ac277ac33805b287e8ee6eed73d006f20
                                                                                                                                                                                                                                                                              • Instruction ID: d8cd491c7332a40dcb9ac7259b38cf6078c9cb3da79a1499af9ce8fef3a27f40
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e62d713bac80f185a3c5432f6249951ac277ac33805b287e8ee6eed73d006f20
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FB51CA6090478C29FB35DBE085157FBBFB49F22380F088599F6C6571C2DA64AA4CC766
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00AF5CE2
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00AF5CFB
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00AF5D59
                                                                                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00AF5D69
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00AF5D7B
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00AF5DCF
                                                                                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00AF5DDD
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00AF5DEF
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00AF5E31
                                                                                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00AF5E44
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00AF5E5A
                                                                                                                                                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00AF5E67
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3096461208-0
                                                                                                                                                                                                                                                                              • Opcode ID: 07142ead82b5bdc9700add61efc28a03e4f8c1ef8160ac9a4fd1589d58f90441
                                                                                                                                                                                                                                                                              • Instruction ID: bd949e153a14d5cc5a4a5048b6be017604c563458ca11d7ac5a6e3846361e842
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 07142ead82b5bdc9700add61efc28a03e4f8c1ef8160ac9a4fd1589d58f90441
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B651FD71E00609AFDF18CFA8DD89AAEBBB5EB48300F148129F615E7290DB709E05CB50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AA8BE8,?,00000000,?,?,?,?,00AA8BBA,00000000,?), ref: 00AA8FC5
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00AA8C81
                                                                                                                                                                                                                                                                              • KillTimer.USER32(00000000,?,?,?,?,00AA8BBA,00000000,?), ref: 00AA8D1B
                                                                                                                                                                                                                                                                              • DestroyAcceleratorTable.USER32(00000000), ref: 00AE6973
                                                                                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00AA8BBA,00000000,?), ref: 00AE69A1
                                                                                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00AA8BBA,00000000,?), ref: 00AE69B8
                                                                                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00AA8BBA,00000000), ref: 00AE69D4
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00AE69E6
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 641708696-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8d226bfdce563a66804c24d4a26a3268e1cb54ac520fa1fe0427fbd629bf1a47
                                                                                                                                                                                                                                                                              • Instruction ID: 033d805f331e4096f75dc398e1823becc00efb1c4ec90d3955f03af4e334a2a5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8d226bfdce563a66804c24d4a26a3268e1cb54ac520fa1fe0427fbd629bf1a47
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CB616930502640DFCB359F19DA49B2ABBB1FB51362F18492CE042975E0CB7DA991CF90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9944: GetWindowLongW.USER32(?,000000EB), ref: 00AA9952
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(0000000F), ref: 00AA9862
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ColorLongWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 259745315-0
                                                                                                                                                                                                                                                                              • Opcode ID: fbfa1b9d78f43119ebeffdb4df8d566468974bededfa37120df53c7aa7f5d799
                                                                                                                                                                                                                                                                              • Instruction ID: 492b7e50c1884555986816c2b8b6f8d99209805abee084bbd30ec13addb37a21
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fbfa1b9d78f43119ebeffdb4df8d566468974bededfa37120df53c7aa7f5d799
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D541BF31104640AFDB319F389C89BBE3BA5EB0B331F144615F9A29B1E1CB799C42DB21
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00ADF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00AF9717
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000000,?,00ADF7F8,00000001), ref: 00AF9720
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00ADF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00AF9742
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000000,?,00ADF7F8,00000001), ref: 00AF9745
                                                                                                                                                                                                                                                                              • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00AF9866
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                                                              • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                                                              • Opcode ID: 269dd992bb2c0e6ebabe1a1d0b2a3f35b318a58004bf0485dfff3d3ec014251c
                                                                                                                                                                                                                                                                              • Instruction ID: cad38d5b1859b63c5c922862c7cd82bfadfc47007c00e459c1411900ec22cac9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 269dd992bb2c0e6ebabe1a1d0b2a3f35b318a58004bf0485dfff3d3ec014251c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D0413E72900209AACF04EBE4DE46EFF77B8AF15340F504069F60577091EB755F49CAA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A96B57: _wcslen.LIBCMT ref: 00A96B6A
                                                                                                                                                                                                                                                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00AF07A2
                                                                                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00AF07BE
                                                                                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00AF07DA
                                                                                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00AF0804
                                                                                                                                                                                                                                                                              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00AF082C
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00AF0837
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00AF083C
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                                                              • API String ID: 323675364-22481851
                                                                                                                                                                                                                                                                              • Opcode ID: d9a8fab820f236fc633e0d232f141c0a22d06abb495160832dff82192afd9ad8
                                                                                                                                                                                                                                                                              • Instruction ID: 660f94558e684676bd68c7ead5d704921fc6f3f070ac76b1f12ea885ebc3284e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d9a8fab820f236fc633e0d232f141c0a22d06abb495160832dff82192afd9ad8
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1A41F472D10229ABDF21EBA4DD95DEEB7B8BF14350F04416AF911A7161EB709E04CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B2403B
                                                                                                                                                                                                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00B24042
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B24055
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00B2405D
                                                                                                                                                                                                                                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B24068
                                                                                                                                                                                                                                                                              • DeleteDC.GDI32(00000000), ref: 00B24072
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00B2407C
                                                                                                                                                                                                                                                                              • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00B24092
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00B2409E
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                                                                                              • String ID: static
                                                                                                                                                                                                                                                                              • API String ID: 2559357485-2160076837
                                                                                                                                                                                                                                                                              • Opcode ID: 671ec4867447dc480f8337d5a6c7b17df2ce58970b7bd25e8d545ae6aec7200d
                                                                                                                                                                                                                                                                              • Instruction ID: b223738e23a841ece3cd52f8a0a395e4545b1b52364dee5ed38ab16261074fb3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 671ec4867447dc480f8337d5a6c7b17df2ce58970b7bd25e8d545ae6aec7200d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0F316E32501225ABDF229FA4EC49FDF3FA8EF0D721F110251FA19A61A0CB75D861DB94
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00B13C5C
                                                                                                                                                                                                                                                                              • CoInitialize.OLE32(00000000), ref: 00B13C8A
                                                                                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00B13C94
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B13D2D
                                                                                                                                                                                                                                                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00B13DB1
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B13ED5
                                                                                                                                                                                                                                                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00B13F0E
                                                                                                                                                                                                                                                                              • CoGetObject.OLE32(?,00000000,00B2FB98,?), ref: 00B13F2D
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000), ref: 00B13F40
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B13FC4
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00B13FD8
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 429561992-0
                                                                                                                                                                                                                                                                              • Opcode ID: fa5e985f94d1cb80e5bbe9cefdace625eb2481042c106bff6f4c2460171bca76
                                                                                                                                                                                                                                                                              • Instruction ID: 07acb8cce4a929b86899ff9ef0a595439338575db1817316b080fc2882bbf44b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fa5e985f94d1cb80e5bbe9cefdace625eb2481042c106bff6f4c2460171bca76
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 17C158716083059FD700DF68C88496BBBE9FF89744F5049ADF98A9B210EB30ED46CB52
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CoInitialize.OLE32(00000000), ref: 00B07AF3
                                                                                                                                                                                                                                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00B07B8F
                                                                                                                                                                                                                                                                              • SHGetDesktopFolder.SHELL32(?), ref: 00B07BA3
                                                                                                                                                                                                                                                                              • CoCreateInstance.OLE32(00B2FD08,00000000,00000001,00B56E6C,?), ref: 00B07BEF
                                                                                                                                                                                                                                                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00B07C74
                                                                                                                                                                                                                                                                              • CoTaskMemFree.OLE32(?,?), ref: 00B07CCC
                                                                                                                                                                                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00B07D57
                                                                                                                                                                                                                                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00B07D7A
                                                                                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00B07D81
                                                                                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00B07DD6
                                                                                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00B07DDC
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2762341140-0
                                                                                                                                                                                                                                                                              • Opcode ID: 31903d649815194decc07287aca6955a3b3a4c35e587590841cd5fed52271b6e
                                                                                                                                                                                                                                                                              • Instruction ID: 18a6418e7b84e7617ba882ebc27dcec9226c029c3da4e1b5070193925f263252
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 31903d649815194decc07287aca6955a3b3a4c35e587590841cd5fed52271b6e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 93C11C75A04109AFDB14DF64C984DAEBBF9FF48304B1485A9E81ADB361DB30EE45CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B25504
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B25515
                                                                                                                                                                                                                                                                              • CharNextW.USER32(00000158), ref: 00B25544
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B25585
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B2559B
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B255AC
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$CharNext
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1350042424-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8864d99a08217bae34174ead6adad31feb9d07459a723f7de4959f96fccf6798
                                                                                                                                                                                                                                                                              • Instruction ID: e9cbb33a6f050ef44f1c42af939794ffd960288afba91c04cc2458640414f400
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8864d99a08217bae34174ead6adad31feb9d07459a723f7de4959f96fccf6798
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 41617F70900628ABDF219F54EC85AFE7BF9EF09720F104185F929A7290D7749A81DB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00AEFAAF
                                                                                                                                                                                                                                                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00AEFB08
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00AEFB1A
                                                                                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00AEFB3A
                                                                                                                                                                                                                                                                              • VariantCopy.OLEAUT32(?,?), ref: 00AEFB8D
                                                                                                                                                                                                                                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00AEFBA1
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00AEFBB6
                                                                                                                                                                                                                                                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00AEFBC3
                                                                                                                                                                                                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AEFBCC
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00AEFBDE
                                                                                                                                                                                                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AEFBE9
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2706829360-0
                                                                                                                                                                                                                                                                              • Opcode ID: 6b01a6587d9e45ff5c63b826116a31ffe44ea4c34d593327587f8a6fe3c360ee
                                                                                                                                                                                                                                                                              • Instruction ID: ddc69e74a71eff19deca7afd28967e32f9af3d1d839262aab3762ddd491460b7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6b01a6587d9e45ff5c63b826116a31ffe44ea4c34d593327587f8a6fe3c360ee
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1F414F35A002199FCF10EF69CC549AEBFB9FF48354F108469E956A7361DB30A946CFA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetKeyboardState.USER32(?), ref: 00AF9CA1
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00AF9D22
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(000000A0), ref: 00AF9D3D
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(000000A1), ref: 00AF9D57
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(000000A1), ref: 00AF9D6C
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000011), ref: 00AF9D84
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(00000011), ref: 00AF9D96
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000012), ref: 00AF9DAE
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(00000012), ref: 00AF9DC0
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00AF9DD8
                                                                                                                                                                                                                                                                              • GetKeyState.USER32(0000005B), ref: 00AF9DEA
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 541375521-0
                                                                                                                                                                                                                                                                              • Opcode ID: 63219e633ef9a0e83e2ae6c0a23c9106e82158efee3f1473337a4470f643562f
                                                                                                                                                                                                                                                                              • Instruction ID: 11e4140f0f552f99d6c0809fc97dbc4f0275c23e5da891c577351347148f8aff
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 63219e633ef9a0e83e2ae6c0a23c9106e82158efee3f1473337a4470f643562f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 33419434504BCD6DFF3197E4C8043B7BEA06B22344F14805AEBC6575C2DBA599C8C7A2
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • WSAStartup.WSOCK32(00000101,?), ref: 00B105BC
                                                                                                                                                                                                                                                                              • inet_addr.WSOCK32(?), ref: 00B1061C
                                                                                                                                                                                                                                                                              • gethostbyname.WSOCK32(?), ref: 00B10628
                                                                                                                                                                                                                                                                              • IcmpCreateFile.IPHLPAPI ref: 00B10636
                                                                                                                                                                                                                                                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B106C6
                                                                                                                                                                                                                                                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B106E5
                                                                                                                                                                                                                                                                              • IcmpCloseHandle.IPHLPAPI(?), ref: 00B107B9
                                                                                                                                                                                                                                                                              • WSACleanup.WSOCK32 ref: 00B107BF
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                                                              • String ID: Ping
                                                                                                                                                                                                                                                                              • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                                                              • Opcode ID: b00d3eaab8e04a81f087d047ed02645c3b9858d32005425763c8e6c0ff275c62
                                                                                                                                                                                                                                                                              • Instruction ID: bf8e9e60e569a1069dc29d786d8f5debb1f0897a703eed9e07ee115a7a4cacf7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b00d3eaab8e04a81f087d047ed02645c3b9858d32005425763c8e6c0ff275c62
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9391BE356182019FD720EF15C989F5ABBE0EF44318F5485A9F4698B6A2CBB0ECC1CF91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                                                              • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                                                              • API String ID: 707087890-567219261
                                                                                                                                                                                                                                                                              • Opcode ID: 87373c908985cdd9e71d64241a369f16a9f1789eb292b4857d99dbcf459f22d1
                                                                                                                                                                                                                                                                              • Instruction ID: cfde7c5bd9e7ee25fc0c94bc5042f314446088218718cfe40fdd25f18dde45a2
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 87373c908985cdd9e71d64241a369f16a9f1789eb292b4857d99dbcf459f22d1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FE516032A001169ACF14DF68C9909FEB7E6FF65724BA442A9E825E72C5DB31DD80C790
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CoInitialize.OLE32 ref: 00B13774
                                                                                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00B1377F
                                                                                                                                                                                                                                                                              • CoCreateInstance.OLE32(?,00000000,00000017,00B2FB78,?), ref: 00B137D9
                                                                                                                                                                                                                                                                              • IIDFromString.OLE32(?,?), ref: 00B1384C
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00B138E4
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00B13936
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                                                              • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                                                              • Opcode ID: c3b5d86ebc96e554f80c639e68d1ca4af3d505203dda155b06b08974f51135d2
                                                                                                                                                                                                                                                                              • Instruction ID: 056a61abc56f011ff50602200e441317915e9c4226ad4dc7602792ef01eaa833
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c3b5d86ebc96e554f80c639e68d1ca4af3d505203dda155b06b08974f51135d2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9B61B370608301AFD711DF54C884FAEBBE8EF45B10F504899F9859B291E770EE88CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00B033CF
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00B033F0
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                                              • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                                                                              • Opcode ID: 847126900c9f977b79a5bfd9550ffacb243b0b90b3d6a5145246864e8e4dcc8e
                                                                                                                                                                                                                                                                              • Instruction ID: 73e4de52401a7688b09044b35789ea6562f437867431468b50e103a76a3151e3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 847126900c9f977b79a5bfd9550ffacb243b0b90b3d6a5145246864e8e4dcc8e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DF517B32A00209BADF15EBA0CE46EEEB7F8AF14740F1441A5F505771A2EB612F58DB61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                                                                              • API String ID: 1256254125-769500911
                                                                                                                                                                                                                                                                              • Opcode ID: 3a5e1b5fa3a1dde579fc4a4a56b9aa89163f48b3ec1687068fdf34035844070d
                                                                                                                                                                                                                                                                              • Instruction ID: c6cc51c620a6fe6593f079434d70c9e1550433750e2441031247da10103d82fd
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3a5e1b5fa3a1dde579fc4a4a56b9aa89163f48b3ec1687068fdf34035844070d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7341F832A1102A9BCB606FFDCD905BE77B5AF64754B244529FA21DB284F731CD81C7A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00B053A0
                                                                                                                                                                                                                                                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00B05416
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00B05420
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00B054A7
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                                                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                                                                              • API String ID: 4194297153-14809454
                                                                                                                                                                                                                                                                              • Opcode ID: aaaa27a62ce2e3fcf55d213e48a11fff91c6edcc6284cbe135035014615efb85
                                                                                                                                                                                                                                                                              • Instruction ID: 19b771acc9b51af6b964ea8f21b2ecf6d5cc59c2ec3ea18052e02d41c3f0dacb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aaaa27a62ce2e3fcf55d213e48a11fff91c6edcc6284cbe135035014615efb85
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 09318B35A006099FDB20DF68C585AEEBBF4EB04305F5480A9E8059B796DB70DD86CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateMenu.USER32 ref: 00B23C79
                                                                                                                                                                                                                                                                              • SetMenu.USER32(?,00000000), ref: 00B23C88
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B23D10
                                                                                                                                                                                                                                                                              • IsMenu.USER32(?), ref: 00B23D24
                                                                                                                                                                                                                                                                              • CreatePopupMenu.USER32 ref: 00B23D2E
                                                                                                                                                                                                                                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B23D5B
                                                                                                                                                                                                                                                                              • DrawMenuBar.USER32 ref: 00B23D63
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                                                              • String ID: 0$F
                                                                                                                                                                                                                                                                              • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                                                              • Opcode ID: 182a47417878bd81312f65fb258bbccaaed8eda14987a5fd553112015a79d344
                                                                                                                                                                                                                                                                              • Instruction ID: 7f4f89a37be4528a088b3cb880dc92bf4cf107307ba1cb43aafae6b58cc7b1b0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 182a47417878bd81312f65fb258bbccaaed8eda14987a5fd553112015a79d344
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BE418D74A01219AFDB24CF64E884AEA7BF5FF49740F140069F95A97360D778EA11CF90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00AF3CCA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00AF1F64
                                                                                                                                                                                                                                                                              • GetDlgCtrlID.USER32 ref: 00AF1F6F
                                                                                                                                                                                                                                                                              • GetParent.USER32 ref: 00AF1F8B
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AF1F8E
                                                                                                                                                                                                                                                                              • GetDlgCtrlID.USER32(?), ref: 00AF1F97
                                                                                                                                                                                                                                                                              • GetParent.USER32(?), ref: 00AF1FAB
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AF1FAE
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                              • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                                              • Opcode ID: d1f5c2ba1e232163e749696ff3e57e39f18697df61ea7c8cf9d2e250297f7df3
                                                                                                                                                                                                                                                                              • Instruction ID: c671e0147b3d00b4e604ee08175136487300fd928577e33b029871970717b17f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d1f5c2ba1e232163e749696ff3e57e39f18697df61ea7c8cf9d2e250297f7df3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C121CF71A00218BBCF15AFA5CC95EFEBBB8EF05310B00415AFA61A72A1CB345909DB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00AF3CCA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00AF2043
                                                                                                                                                                                                                                                                              • GetDlgCtrlID.USER32 ref: 00AF204E
                                                                                                                                                                                                                                                                              • GetParent.USER32 ref: 00AF206A
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AF206D
                                                                                                                                                                                                                                                                              • GetDlgCtrlID.USER32(?), ref: 00AF2076
                                                                                                                                                                                                                                                                              • GetParent.USER32(?), ref: 00AF208A
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AF208D
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                              • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                                              • Opcode ID: 93f23fae5ab2201ebfe81a1effdb4db721aa0747bc8c5b8c7baea31df10a8c13
                                                                                                                                                                                                                                                                              • Instruction ID: 786b2b7b159a220118d506aaf3fe6ec55b3a61db4f6fafc2deff34e87c5a3a0b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 93f23fae5ab2201ebfe81a1effdb4db721aa0747bc8c5b8c7baea31df10a8c13
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8F21A476A00218BBCF21AFA4CD85EFEBFB8EF05340F004455BA51A72A1DA755919DB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B23A9D
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B23AA0
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B23AC7
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B23AEA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B23B62
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00B23BAC
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00B23BC7
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00B23BE2
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00B23BF6
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00B23C13
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 312131281-0
                                                                                                                                                                                                                                                                              • Opcode ID: e2c3445c325ac3d96618c5576a61fa53f50f364fb0c87bd03d3b9e82923d9d20
                                                                                                                                                                                                                                                                              • Instruction ID: e66e0f28ca0d93f032bfc76fe59484504da65bbe61b30046133c522effd879db
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e2c3445c325ac3d96618c5576a61fa53f50f364fb0c87bd03d3b9e82923d9d20
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 88616A75900218AFDB10DFA8DC81EEE77F8EB09700F14019AFA19A72A1C778AE41DB50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00AFB151
                                                                                                                                                                                                                                                                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00AFA1E1,?,00000001), ref: 00AFB165
                                                                                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00AFB16C
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00AFA1E1,?,00000001), ref: 00AFB17B
                                                                                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00AFB18D
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00AFA1E1,?,00000001), ref: 00AFB1A6
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00AFA1E1,?,00000001), ref: 00AFB1B8
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00AFA1E1,?,00000001), ref: 00AFB1FD
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00AFA1E1,?,00000001), ref: 00AFB212
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00AFA1E1,?,00000001), ref: 00AFB21D
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2156557900-0
                                                                                                                                                                                                                                                                              • Opcode ID: dc183d75d8b89c9bb64d72a9f8345f06cdc8f6e781128011b729d09642b0a4bd
                                                                                                                                                                                                                                                                              • Instruction ID: 9ce8116fc1e9567f6f6e8e7ea720d6c74c56567562d9d753ca5e22fcf1814aec
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dc183d75d8b89c9bb64d72a9f8345f06cdc8f6e781128011b729d09642b0a4bd
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8831BB71520208BFEB219FA4DC58BBD7BB9FB61711F204104FA00D71A0DBB89A458F74
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2C94
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000), ref: 00AC29DE
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: GetLastError.KERNEL32(00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000,00000000), ref: 00AC29F0
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CA0
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CAB
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CB6
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CC1
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CCC
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CD7
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CE2
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CED
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2CFB
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 776569668-0
                                                                                                                                                                                                                                                                              • Opcode ID: f0c98478cad08e54fa94022d1121d75cb87c6f627ba569325c894ab905248991
                                                                                                                                                                                                                                                                              • Instruction ID: ea1019fd9dc3b97b2f6f0afc318328028c1b86a80986bc888b1163e57ba04c75
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f0c98478cad08e54fa94022d1121d75cb87c6f627ba569325c894ab905248991
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C8115676510108BFCB02EF54DA82EDD3BA9FF45350F5245A9FA489F222DA31EE509B90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B07FAD
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00B07FC1
                                                                                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00B07FEB
                                                                                                                                                                                                                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00B08005
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00B08017
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00B08060
                                                                                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00B080B0
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                                                                                              • API String ID: 769691225-438819550
                                                                                                                                                                                                                                                                              • Opcode ID: c4ce35e4f641a37ce0229d0987b8018cb730036c9936fbba63343d4df10a5708
                                                                                                                                                                                                                                                                              • Instruction ID: c42bcf649a7363633f2db4e5f7f8dd9590a7d06f6475184128c7f4e6187d3d09
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c4ce35e4f641a37ce0229d0987b8018cb730036c9936fbba63343d4df10a5708
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F58182729482459BCB20DF14C5849AEFBD8FF88310F5448AEF485D7291EB35ED458B92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000EB), ref: 00A95C7A
                                                                                                                                                                                                                                                                                • Part of subcall function 00A95D0A: GetClientRect.USER32(?,?), ref: 00A95D30
                                                                                                                                                                                                                                                                                • Part of subcall function 00A95D0A: GetWindowRect.USER32(?,?), ref: 00A95D71
                                                                                                                                                                                                                                                                                • Part of subcall function 00A95D0A: ScreenToClient.USER32(?,?), ref: 00A95D99
                                                                                                                                                                                                                                                                              • GetDC.USER32 ref: 00AD46F5
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00AD4708
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00AD4716
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00AD472B
                                                                                                                                                                                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00AD4733
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00AD47C4
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                                                              • String ID: U
                                                                                                                                                                                                                                                                              • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                                                              • Opcode ID: ede01be270c3413d98b658e7ea0c846142b0f8b1358c17a0d7529f6a5b2c85f0
                                                                                                                                                                                                                                                                              • Instruction ID: 95c5efc1c24094d7b033d566243c0ab4bb5695d7308d8acaf1c074ea79673404
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ede01be270c3413d98b658e7ea0c846142b0f8b1358c17a0d7529f6a5b2c85f0
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FD71DE35900205DFCF228F68C985ABA7BB5FF4A360F18426AE9565B2A6C731CC41DF50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00B035E4
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00B62390,?,00000FFF,?), ref: 00B0360A
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                                              • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                                                                              • Opcode ID: cb64d2c6ee905999a42ed7c7d55b5a5a6c25b4cbe1d026d31f996815a7f9b37e
                                                                                                                                                                                                                                                                              • Instruction ID: 76e85529cc6e019af2b54ccac2a6b092efddc8132cc76f436f127663fea0b9a9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cb64d2c6ee905999a42ed7c7d55b5a5a6c25b4cbe1d026d31f996815a7f9b37e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0E519072900209BADF15EBE0CD46EEEBBB8EF14700F0441A9F505761A1EB711A99DFA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA912D: GetCursorPos.USER32(?), ref: 00AA9141
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA912D: ScreenToClient.USER32(00000000,?), ref: 00AA915E
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA912D: GetAsyncKeyState.USER32(00000001), ref: 00AA9183
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA912D: GetAsyncKeyState.USER32(00000002), ref: 00AA919D
                                                                                                                                                                                                                                                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00B28B6B
                                                                                                                                                                                                                                                                              • ImageList_EndDrag.COMCTL32 ref: 00B28B71
                                                                                                                                                                                                                                                                              • ReleaseCapture.USER32 ref: 00B28B77
                                                                                                                                                                                                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 00B28C12
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B28C25
                                                                                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00B28CFF
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                                                                                                                                                                                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                                                                                                                                                                                              • API String ID: 1924731296-2107944366
                                                                                                                                                                                                                                                                              • Opcode ID: 731abce5b5aa9e1bbbf86b39c83acf5ee0c1f43557b684fc93a0c617b5aefb35
                                                                                                                                                                                                                                                                              • Instruction ID: 9b1be0e36f29cf7d26a63cd8eed4b9f634ddecc10b5e16a95026ba04c1d7f413
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 731abce5b5aa9e1bbbf86b39c83acf5ee0c1f43557b684fc93a0c617b5aefb35
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 08518A71205310AFDB14DF24DD96BAA77E4FB88710F000A6DF95A972E1CB749905CBA2
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B0C272
                                                                                                                                                                                                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B0C29A
                                                                                                                                                                                                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B0C2CA
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00B0C322
                                                                                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 00B0C336
                                                                                                                                                                                                                                                                              • InternetCloseHandle.WININET(00000000), ref: 00B0C341
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                                                              • Opcode ID: 7ee7459a8599202cee0cc4240a951fba5a9deef77cffbd538ded5d84d68841d3
                                                                                                                                                                                                                                                                              • Instruction ID: 20a74d01e8edd05e088d16e2edc6e34cca91ea3b1e8b94858c8e38423cfe6d7d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7ee7459a8599202cee0cc4240a951fba5a9deef77cffbd538ded5d84d68841d3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B5317AB1600608AFD7219FA48C88AAF7FFCEB49744F10865EF44693290DB34ED059BA5
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00AD3AAF,?,?,Bad directive syntax error,00B2CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00AF98BC
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000000,?,00AD3AAF,?), ref: 00AF98C3
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00AF9987
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                                                              • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                                                              • Opcode ID: 87b272194292e57f66c72e84cbad0b527b62059148523bfefecf9df3f433e7b1
                                                                                                                                                                                                                                                                              • Instruction ID: b73f5ab5bc6b6044a6b430fedc9a25788765d4e1431683774e783c330cad7249
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 87b272194292e57f66c72e84cbad0b527b62059148523bfefecf9df3f433e7b1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C4217E3294021EBBCF15AF90CD46EFE77B9FF18301F0444AAF915660A2EB719618DB61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetParent.USER32 ref: 00AF20AB
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00AF20C0
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00AF214D
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                                                              • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                                                              • Opcode ID: 8e85a2829308947126b161e4c150594be8fef6e24891a6d208d7dc0c787df331
                                                                                                                                                                                                                                                                              • Instruction ID: b8aea2d8fad1a27a8a600baf7f91262ff02edb961aeaeefa4eaf081f0cc09e75
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8e85a2829308947126b161e4c150594be8fef6e24891a6d208d7dc0c787df331
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6D110A7668470AB9FA216760DC1BFFA779CDF05365B20025AFB04A60E2FE61A806571C
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: a7bb7ec5853375509495a6ac18576ccacac087c26e55c8da25b72dd4e55b1e02
                                                                                                                                                                                                                                                                              • Instruction ID: 870e1e6d0c04c701d4cf5ea206dd14d2101e45205f7694ae8dd29346c6723007
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a7bb7ec5853375509495a6ac18576ccacac087c26e55c8da25b72dd4e55b1e02
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 38C1E174904249AFDF11EFA8C945FEEBBB4BF09310F0A409DE415A7392CB749941CB61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1282221369-0
                                                                                                                                                                                                                                                                              • Opcode ID: bac1e57ccf197131c497d3cd27e6f5274129eff460b81e31de52666850302295
                                                                                                                                                                                                                                                                              • Instruction ID: e94910d184dae48c4c5faa5c81b933664471f2756badb6ea75e1b9189216c34d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bac1e57ccf197131c497d3cd27e6f5274129eff460b81e31de52666850302295
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B3613871908300AFDB21AFB89981F6E7BA9EF05330F07427DF949D7282EA759D018790
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00AE6890
                                                                                                                                                                                                                                                                              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00AE68A9
                                                                                                                                                                                                                                                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00AE68B9
                                                                                                                                                                                                                                                                              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00AE68D1
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00AE68F2
                                                                                                                                                                                                                                                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00AA8874,00000000,00000000,00000000,000000FF,00000000), ref: 00AE6901
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00AE691E
                                                                                                                                                                                                                                                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00AA8874,00000000,00000000,00000000,000000FF,00000000), ref: 00AE692D
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1268354404-0
                                                                                                                                                                                                                                                                              • Opcode ID: 313605f33463da188408aa368bc5fc7eedda53f061312dc1ce72507403460b00
                                                                                                                                                                                                                                                                              • Instruction ID: ef9db78066e94cf2d018070377aa6b424aaf151c28f39a1f8dffa2ec2140f2f4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 313605f33463da188408aa368bc5fc7eedda53f061312dc1ce72507403460b00
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 48519770600209AFDB20DF29CC95BAE7BB5EF59750F104928F916972E0DB74E991CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B0C182
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00B0C195
                                                                                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 00B0C1A9
                                                                                                                                                                                                                                                                                • Part of subcall function 00B0C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B0C272
                                                                                                                                                                                                                                                                                • Part of subcall function 00B0C253: GetLastError.KERNEL32 ref: 00B0C322
                                                                                                                                                                                                                                                                                • Part of subcall function 00B0C253: SetEvent.KERNEL32(?), ref: 00B0C336
                                                                                                                                                                                                                                                                                • Part of subcall function 00B0C253: InternetCloseHandle.WININET(00000000), ref: 00B0C341
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 337547030-0
                                                                                                                                                                                                                                                                              • Opcode ID: db45bfc3566e9e2989593a0b793dabfe9d8a991cb4a1f1486fade771b3426db4
                                                                                                                                                                                                                                                                              • Instruction ID: 6a16c27d00432b36743ff6aa6fdd9f9d2c07e6a45e79332d2ba2a6afd9a53beb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: db45bfc3566e9e2989593a0b793dabfe9d8a991cb4a1f1486fade771b3426db4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2A318B71600601FFDB219FE5DD44A6ABFF8FF18300B00466DF95A83A60DB30E815ABA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00AF3A57
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: GetCurrentThreadId.KERNEL32 ref: 00AF3A5E
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00AF25B3), ref: 00AF3A65
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00AF25BD
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00AF25DB
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00AF25DF
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00AF25E9
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00AF2601
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00AF2605
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00AF260F
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00AF2623
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00AF2627
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2014098862-0
                                                                                                                                                                                                                                                                              • Opcode ID: 91c51276333b9dacfbd3e30e4c07b13b6e7d416624b3a18ac94aaef3cdb20f46
                                                                                                                                                                                                                                                                              • Instruction ID: 7b5f160f78edd7b8863c015cd85dfe87d183c4ad666ffaa7e6c943b35428a699
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 91c51276333b9dacfbd3e30e4c07b13b6e7d416624b3a18ac94aaef3cdb20f46
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E801D431390614BBFB2067A99C8AF693F59DF4EB52F200011F328AF0D1CDE224458A69
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00AF1449,?,?,00000000), ref: 00AF180C
                                                                                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000,?,00AF1449,?,?,00000000), ref: 00AF1813
                                                                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00AF1449,?,?,00000000), ref: 00AF1828
                                                                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00AF1449,?,?,00000000), ref: 00AF1830
                                                                                                                                                                                                                                                                              • DuplicateHandle.KERNEL32(00000000,?,00AF1449,?,?,00000000), ref: 00AF1833
                                                                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00AF1449,?,?,00000000), ref: 00AF1843
                                                                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00AF1449,00000000,?,00AF1449,?,?,00000000), ref: 00AF184B
                                                                                                                                                                                                                                                                              • DuplicateHandle.KERNEL32(00000000,?,00AF1449,?,?,00000000), ref: 00AF184E
                                                                                                                                                                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,00AF1874,00000000,00000000,00000000), ref: 00AF1868
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1957940570-0
                                                                                                                                                                                                                                                                              • Opcode ID: 1c07dd0064ec0cc010da82e8fd7dab2cb4c4c21546bf8c51b4886b2d224afff1
                                                                                                                                                                                                                                                                              • Instruction ID: 6166a8dfcf92940dd4f43d9938754128f52dab245336635e96b8041c948f1f8e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1c07dd0064ec0cc010da82e8fd7dab2cb4c4c21546bf8c51b4886b2d224afff1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5101BBB5640308BFE720ABA5DC4EF6B3FACEB89B11F104411FA05DB1A1CA749815CB64
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00AFD501
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00AFD50F
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFD4DC: CloseHandle.KERNELBASE(00000000), ref: 00AFD5DC
                                                                                                                                                                                                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B1A16D
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00B1A180
                                                                                                                                                                                                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B1A1B3
                                                                                                                                                                                                                                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B1A268
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(00000000), ref: 00B1A273
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00B1A2C4
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                                                              • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                                                              • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                                                              • Opcode ID: 2de3c9f0e000961d0a79d1011e957594fa998401d8477c461c20d60eb86e34e0
                                                                                                                                                                                                                                                                              • Instruction ID: c574875b0fa60fab0acd8c11aec2997742ecefa273e79dc4b58b8b201a90e806
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2de3c9f0e000961d0a79d1011e957594fa998401d8477c461c20d60eb86e34e0
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BF618F31205241AFD720DF14C594F6ABBE1AF45318F54849CE4568B7A3C772FD8ACB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B23925
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00B2393A
                                                                                                                                                                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B23954
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B23999
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B239C6
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B239F4
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                                                              • String ID: SysListView32
                                                                                                                                                                                                                                                                              • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                                                              • Opcode ID: 4188bdb48c1ed76b4a44852df0eb6114bec77964bb7c283806df729e9db1e257
                                                                                                                                                                                                                                                                              • Instruction ID: 41b63b07248b9efac7c8c6a356c7abb6b06fa5a6ed3de96622bcb5cf8ac54b38
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4188bdb48c1ed76b4a44852df0eb6114bec77964bb7c283806df729e9db1e257
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B741E431A00228ABEF219F64DC45BEE7BE9EF08750F100566F949EB281D7759E80CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AFBCFD
                                                                                                                                                                                                                                                                              • IsMenu.USER32(00000000), ref: 00AFBD1D
                                                                                                                                                                                                                                                                              • CreatePopupMenu.USER32 ref: 00AFBD53
                                                                                                                                                                                                                                                                              • GetMenuItemCount.USER32(01535B18), ref: 00AFBDA4
                                                                                                                                                                                                                                                                              • InsertMenuItemW.USER32(01535B18,?,00000001,00000030), ref: 00AFBDCC
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                                                              • String ID: 0$2
                                                                                                                                                                                                                                                                              • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                                                              • Opcode ID: f03fb1116ebfada67e6def0eab739a1629f34ab46e30b4fb2060005d83781044
                                                                                                                                                                                                                                                                              • Instruction ID: 96f00d0a7309bcc8ffe92e147af013846e4cd081beac1180604c137f83a76641
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f03fb1116ebfada67e6def0eab739a1629f34ab46e30b4fb2060005d83781044
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2A519C70A1020D9BDB20DFE8D984BBEBBF8AF55314F144219F6519B291D7709941CB72
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadIconW.USER32(00000000,00007F03), ref: 00AFC913
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: IconLoad
                                                                                                                                                                                                                                                                              • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                                                              • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                                                              • Opcode ID: fb513dff049e4cab86a8b9c021cd354764e13ba9172f989396afb9e9ae758689
                                                                                                                                                                                                                                                                              • Instruction ID: 2a77bd8fbe4e0c5838d6150d3fefcba5c821ab72c6fd758fb9011f81016bdf08
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fb513dff049e4cab86a8b9c021cd354764e13ba9172f989396afb9e9ae758689
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8D112E3168930EBAE7015795DEC2DFE67ECDF19375B50006EFA00A7293E7A19E045264
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                                                              • String ID: 0.0.0.0
                                                                                                                                                                                                                                                                              • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                                                              • Opcode ID: c11a680982add5f72c173a8a7ffdf23097ae541379fea95c43ae365916439a44
                                                                                                                                                                                                                                                                              • Instruction ID: b465187d7e4b8d05b063537c80e9da97ecbe6fd1899fd4fe78a13b8ec0957b89
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c11a680982add5f72c173a8a7ffdf23097ae541379fea95c43ae365916439a44
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E0110A31504118AFCB31ABA0DD0AEFE7BBDDF15711F0101A9F6459B0A2EF718A818A50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 00B29FC7
                                                                                                                                                                                                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 00B29FE7
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00B2A224
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B2A242
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B2A263
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(00000003,00000000), ref: 00B2A282
                                                                                                                                                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00B2A2A7
                                                                                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 00B2A2CA
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1211466189-0
                                                                                                                                                                                                                                                                              • Opcode ID: b82e79c2d11b2ccea459c57d6fc6be813f2d954ed66f67c6bd01e5dbc3a4d9ec
                                                                                                                                                                                                                                                                              • Instruction ID: abd751fbcd82d935f9e530580f35780f170c9446474aa8764bdc74b33e837bd4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b82e79c2d11b2ccea459c57d6fc6be813f2d954ed66f67c6bd01e5dbc3a4d9ec
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C1B19931600225DFDF14CF68D9857AE7BF2FF49711F0880A9EC49AB299DB31A950CB61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 952045576-0
                                                                                                                                                                                                                                                                              • Opcode ID: eff44366af461e013a709ef199a864735cb44cb2a23ac754a280c6b15f90fae4
                                                                                                                                                                                                                                                                              • Instruction ID: c90ff947dfececb9abf4f5411aac1255fff5dd23ba3674dbb4cc66000d9b1eeb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: eff44366af461e013a709ef199a864735cb44cb2a23ac754a280c6b15f90fae4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D0417C65C10218B6DB11EBF4C88A9DFB7ACAF45710F508462F618E3123FB34E255C3A6
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00AE682C,00000004,00000000,00000000), ref: 00AAF953
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00AE682C,00000004,00000000,00000000), ref: 00AEF3D1
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00AE682C,00000004,00000000,00000000), ref: 00AEF454
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ShowWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1268545403-0
                                                                                                                                                                                                                                                                              • Opcode ID: d44982a288f9b86679bd699c331de852331143ea8581b0430a3a8eb067ade25e
                                                                                                                                                                                                                                                                              • Instruction ID: af9deb058e91d9e7c946b0580f4914ab73a164d97b44d38c525474b28602f379
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d44982a288f9b86679bd699c331de852331143ea8581b0430a3a8eb067ade25e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2C41F431608680BEC77D8B6DCC8876BBBA2AB57310F14483CE097575E0CB72A881CB51
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00B22D1B
                                                                                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00B22D23
                                                                                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B22D2E
                                                                                                                                                                                                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00B22D3A
                                                                                                                                                                                                                                                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B22D76
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B22D87
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B25A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00B22DC2
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B22DE1
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3864802216-0
                                                                                                                                                                                                                                                                              • Opcode ID: 2297dc8a4679919464385566c11cc3a4bafbe472ac49f3aea46dcb3efabd0ba9
                                                                                                                                                                                                                                                                              • Instruction ID: e3bf4436d2b95a11b73905450ff59d3dd4b8a9f83a4db274832702e400d332f8
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2297dc8a4679919464385566c11cc3a4bafbe472ac49f3aea46dcb3efabd0ba9
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0F316D72201224BBEB214F509C8AFEB3FA9EF09755F044065FE08DB291CA759C51C7A4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _memcmp
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2931989736-0
                                                                                                                                                                                                                                                                              • Opcode ID: 2f3397f56d2ddc45d07107f113fad65bd4fc78402a4c1393edf50f84a410fb7a
                                                                                                                                                                                                                                                                              • Instruction ID: 5ade907f2232a18edda30ad97880b7ce62d123ffb2fc18f3d423ffd4e043e198
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2f3397f56d2ddc45d07107f113fad65bd4fc78402a4c1393edf50f84a410fb7a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CB219571E44A1E77969466709E92FFA33ECAE203C4F880030FF19DE682F720ED1181A5
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                                                              • API String ID: 0-572801152
                                                                                                                                                                                                                                                                              • Opcode ID: 7d7dcd05be8e5e4933b8827d8d370d703ae658fc3ed36305338635e140099d53
                                                                                                                                                                                                                                                                              • Instruction ID: 6a79faaee69334df6644d647817268857a531f0b2eaab9eec53204aa0be32923
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7d7dcd05be8e5e4933b8827d8d370d703ae658fc3ed36305338635e140099d53
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D3D17171A0060ADFDB20CF98D885BEEB7F5FF88344F5480A9E915AB281D770D985CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00AD17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00AD15CE
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00AD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00AD1651
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00AD17FB,?,00AD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00AD16E4
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00AD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00AD16FB
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC3820: RtlAllocateHeap.NTDLL(00000000,?,00B61444,?,00AAFDF5,?,?,00A9A976,00000010,00B61440,00A913FC,?,00A913C6,?,00A91129), ref: 00AC3852
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00AD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00AD1777
                                                                                                                                                                                                                                                                              • __freea.LIBCMT ref: 00AD17A2
                                                                                                                                                                                                                                                                              • __freea.LIBCMT ref: 00AD17AE
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2829977744-0
                                                                                                                                                                                                                                                                              • Opcode ID: 9c694c212c72a597fc66b2ec4d3df5cd91392497df16192fd2eede9fedba6836
                                                                                                                                                                                                                                                                              • Instruction ID: 7e1ae1633f75e9eef32646be302517f0032e39e341213b3c91295918be1da6e4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9c694c212c72a597fc66b2ec4d3df5cd91392497df16192fd2eede9fedba6836
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D091B172E00216AEDB208F64D981AEE7BB5AF49310F18465AE807E7391DB39DD41CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                                                              • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                                                              • Opcode ID: 7dc952253a2890ec62ca2f16e394b1411bc6a10fe9cecf3409d9f83d62ee6b75
                                                                                                                                                                                                                                                                              • Instruction ID: 223253dfbff0cf707700b63905d692fe301c81cb96540cebbd608648bea03fe4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7dc952253a2890ec62ca2f16e394b1411bc6a10fe9cecf3409d9f83d62ee6b75
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 67917D71A00219ABDF20CFA4D884FEEBBF8EF46715F108599F515AB280D7709D85CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00B0125C
                                                                                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00B01284
                                                                                                                                                                                                                                                                              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00B012A8
                                                                                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B012D8
                                                                                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B0135F
                                                                                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B013C4
                                                                                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B01430
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2550207440-0
                                                                                                                                                                                                                                                                              • Opcode ID: 6e798fbd2244f01fbf99ae0adaffc30f3a84ac32068fdd08155f0f6b297bfb58
                                                                                                                                                                                                                                                                              • Instruction ID: 64eab7ba15fb1fe0ad01ca6f1c8b4459c7c9ad3d861780e16e396adf9ed80ca5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6e798fbd2244f01fbf99ae0adaffc30f3a84ac32068fdd08155f0f6b297bfb58
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DD91E271A00208AFDB18DF98C885BBEBBF5FF45314F1048A9E911EB2E1D774A941CB90
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3225163088-0
                                                                                                                                                                                                                                                                              • Opcode ID: 68c6fb904563d6a7c6f2ebfaa869450bd61d8d3d67e597dbca36ab3fdfee9869
                                                                                                                                                                                                                                                                              • Instruction ID: 706f68749b956f1d847efed5eb8ef231c7f8c3c1f0159606f66bc1f5164de804
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 68c6fb904563d6a7c6f2ebfaa869450bd61d8d3d67e597dbca36ab3fdfee9869
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F3914571D4021AEFCB15CFA9CC85AEEBBB9FF49320F148049E515B7291D774AA42CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00B1396B
                                                                                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00B13A7A
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B13A8A
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00B13C1F
                                                                                                                                                                                                                                                                                • Part of subcall function 00B00CDF: VariantInit.OLEAUT32(00000000), ref: 00B00D1F
                                                                                                                                                                                                                                                                                • Part of subcall function 00B00CDF: VariantCopy.OLEAUT32(?,?), ref: 00B00D28
                                                                                                                                                                                                                                                                                • Part of subcall function 00B00CDF: VariantClear.OLEAUT32(?), ref: 00B00D34
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                                                              • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                                                              • Opcode ID: 67f11ec752adbc55bf673d5162738ed2b4be1f56c36b6e58370879f06976b993
                                                                                                                                                                                                                                                                              • Instruction ID: 6f135e09363ce844977c048927e4ea1410c45944a04f6b04329e5bffe2df56d2
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 67f11ec752adbc55bf673d5162738ed2b4be1f56c36b6e58370879f06976b993
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD915A756083059FCB04DF24C58096AB7E4FF89714F5489ADF88A9B351EB30EE45CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?,?,?,00AF035E), ref: 00AF002B
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?,?), ref: 00AF0046
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?,?), ref: 00AF0054
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?), ref: 00AF0064
                                                                                                                                                                                                                                                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00B14C51
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B14D59
                                                                                                                                                                                                                                                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00B14DCF
                                                                                                                                                                                                                                                                              • CoTaskMemFree.OLE32(?), ref: 00B14DDA
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                                                              • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                                                              • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                                                              • Opcode ID: 251fcac617958cead7efe465cdeebe9cf23510164bcbb984e7aea73438fc0977
                                                                                                                                                                                                                                                                              • Instruction ID: 639900312cc0696be617370135360c8189a318e9b5e1c6649cb3ad28a34717e3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 251fcac617958cead7efe465cdeebe9cf23510164bcbb984e7aea73438fc0977
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 50911872D0021DAFDF14DFA4D891AEEB7B9FF08310F5085AAE915AB251DB305A45CFA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetMenu.USER32(?), ref: 00B22183
                                                                                                                                                                                                                                                                              • GetMenuItemCount.USER32(00000000), ref: 00B221B5
                                                                                                                                                                                                                                                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B221DD
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B22213
                                                                                                                                                                                                                                                                              • GetMenuItemID.USER32(?,?), ref: 00B2224D
                                                                                                                                                                                                                                                                              • GetSubMenu.USER32(?,?), ref: 00B2225B
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00AF3A57
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: GetCurrentThreadId.KERNEL32 ref: 00AF3A5E
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00AF25B3), ref: 00AF3A65
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B222E3
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFE97B: Sleep.KERNEL32 ref: 00AFE9F3
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4196846111-0
                                                                                                                                                                                                                                                                              • Opcode ID: 7dc6d12db9889104cfd25cb2d8e95f483916c98626b858916e920b7c08d89f4f
                                                                                                                                                                                                                                                                              • Instruction ID: 0ad2a889db439e5f8be9d093169b2c37e2bb13f8f6e3a2b56c9e9279b16781fe
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7dc6d12db9889104cfd25cb2d8e95f483916c98626b858916e920b7c08d89f4f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0A719075E00215EFCB14EFA4D981AAEBBF5EF48310F108499E91AEB351DB35ED418B90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • IsWindow.USER32(01535B68), ref: 00B27F37
                                                                                                                                                                                                                                                                              • IsWindowEnabled.USER32(01535B68), ref: 00B27F43
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00B2801E
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(01535B68,000000B0,?,?), ref: 00B28051
                                                                                                                                                                                                                                                                              • IsDlgButtonChecked.USER32(?,?), ref: 00B28089
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(01535B68,000000EC), ref: 00B280AB
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B280C3
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4072528602-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4f841d1910d598aa778eac03508164485a12db8f255849ed8fd3e802048a1364
                                                                                                                                                                                                                                                                              • Instruction ID: f279ebf15f8c4221444be34514c10e9daaca7f0e29bab941bdb86a305be2512f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4f841d1910d598aa778eac03508164485a12db8f255849ed8fd3e802048a1364
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C971DF3464D264AFEB219F64ED84FAABBF5FF09300F140499E949972A1CF31AC45CB54
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetParent.USER32(?), ref: 00AFAEF9
                                                                                                                                                                                                                                                                              • GetKeyboardState.USER32(?), ref: 00AFAF0E
                                                                                                                                                                                                                                                                              • SetKeyboardState.USER32(?), ref: 00AFAF6F
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00AFAF9D
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00AFAFBC
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00AFAFFD
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00AFB020
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 87235514-0
                                                                                                                                                                                                                                                                              • Opcode ID: ce1256ba153a8c71b83461d904f7d0c0b168eba9b54c71cf316c22a1afd0b1c2
                                                                                                                                                                                                                                                                              • Instruction ID: 594f80b2bcdf77965ac715b67059df5995bc741f4200a7919bcd6d7fe9c0f8d3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ce1256ba153a8c71b83461d904f7d0c0b168eba9b54c71cf316c22a1afd0b1c2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0151B3E06147D93DFB3643B4CC45BBABEA96B06304F088589F2D95A8C2C799ACC4D761
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetParent.USER32(00000000), ref: 00AFAD19
                                                                                                                                                                                                                                                                              • GetKeyboardState.USER32(?), ref: 00AFAD2E
                                                                                                                                                                                                                                                                              • SetKeyboardState.USER32(?), ref: 00AFAD8F
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00AFADBB
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00AFADD8
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00AFAE17
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00AFAE38
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 87235514-0
                                                                                                                                                                                                                                                                              • Opcode ID: 6785c57956882c1008a0be0decd966a9c133f3c1cee93a4096bd2c614081c5a5
                                                                                                                                                                                                                                                                              • Instruction ID: ced49bec59c7dd36ba5f9b0f23175b44cdf96fdd65f854455b08d8b8f0350979
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6785c57956882c1008a0be0decd966a9c133f3c1cee93a4096bd2c614081c5a5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9C51D4E16047E93DFB3783A4CC45BFA7EA96B55300F088488F2D9468C2D694EC88D762
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetConsoleCP.KERNEL32(00AD3CD6,?,?,?,?,?,?,?,?,00AC5BA3,?,?,00AD3CD6,?,?), ref: 00AC5470
                                                                                                                                                                                                                                                                              • __fassign.LIBCMT ref: 00AC54EB
                                                                                                                                                                                                                                                                              • __fassign.LIBCMT ref: 00AC5506
                                                                                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00AD3CD6,00000005,00000000,00000000), ref: 00AC552C
                                                                                                                                                                                                                                                                              • WriteFile.KERNEL32(?,00AD3CD6,00000000,00AC5BA3,00000000,?,?,?,?,?,?,?,?,?,00AC5BA3,?), ref: 00AC554B
                                                                                                                                                                                                                                                                              • WriteFile.KERNEL32(?,?,00000001,00AC5BA3,00000000,?,?,?,?,?,?,?,?,?,00AC5BA3,?), ref: 00AC5584
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1324828854-0
                                                                                                                                                                                                                                                                              • Opcode ID: 7b57598f6fa2bb01bef769c94704715b38e9b649d421efde0378f7c7d8b3a2f1
                                                                                                                                                                                                                                                                              • Instruction ID: 86b2fa83be37aa8da2400d60de8aa73ebf5d0846104f26b0643f2c8c2a6b5ca2
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7b57598f6fa2bb01bef769c94704715b38e9b649d421efde0378f7c7d8b3a2f1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 48519D71E00609AFDB10CFA8D845FEEBBF9EB09300F15451EF555E7291D670AA81CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00AB2D4B
                                                                                                                                                                                                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00AB2D53
                                                                                                                                                                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00AB2DE1
                                                                                                                                                                                                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00AB2E0C
                                                                                                                                                                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00AB2E61
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                                                              • String ID: csm
                                                                                                                                                                                                                                                                              • API String ID: 1170836740-1018135373
                                                                                                                                                                                                                                                                              • Opcode ID: 93204b0d9ea8ff7e50ee8e7fe7e650883e9b72c46fda1218f92f9e0e4cb566ee
                                                                                                                                                                                                                                                                              • Instruction ID: 749e41f32de915eb3138b6173186333838bd3dc3db2f5079c7d9494ed7fd01dc
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 93204b0d9ea8ff7e50ee8e7fe7e650883e9b72c46fda1218f92f9e0e4cb566ee
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F5417F35A00209ABCF10EF68C855BDEBFB9BF45324F148196E815AB393D731EA15CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B1307A
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1304E: _wcslen.LIBCMT ref: 00B1309B
                                                                                                                                                                                                                                                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00B11112
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B11121
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B111C9
                                                                                                                                                                                                                                                                              • closesocket.WSOCK32(00000000), ref: 00B111F9
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2675159561-0
                                                                                                                                                                                                                                                                              • Opcode ID: 1749b47ab624e4dbb5f465959ed60e3aa60e0db9c71a39be0cdd625b7029a6b9
                                                                                                                                                                                                                                                                              • Instruction ID: ca1d601ad2b6f1c20de15344a6d3dbbf6fb8dd6f6a7c14730420220a13d87fb6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1749b47ab624e4dbb5f465959ed60e3aa60e0db9c71a39be0cdd625b7029a6b9
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0441D631600604AFDB109F18C885BEDBBE9EF45324F548499FE15AB291DB70ED81CBE1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AFCF22,?), ref: 00AFDDFD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AFCF22,?), ref: 00AFDE16
                                                                                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00AFCF45
                                                                                                                                                                                                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00AFCF7F
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFD005
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFD01B
                                                                                                                                                                                                                                                                              • SHFileOperationW.SHELL32(?), ref: 00AFD061
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                                                              • String ID: \*.*
                                                                                                                                                                                                                                                                              • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                                                              • Opcode ID: 2ac7ea97bfd873a43b839d17ac681144a887605d3b1da37dd63e7dfe76e86fec
                                                                                                                                                                                                                                                                              • Instruction ID: 5f3dda52e2838d443a38d181e93e1c3b773237edafed6b83b4d2efdfae11af27
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2ac7ea97bfd873a43b839d17ac681144a887605d3b1da37dd63e7dfe76e86fec
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BA41347194521D5EDF12EBE4CA81AEEB7B9AF08740F1000E6F605EB152EA34AA45CB50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00B22E1C
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B22E4F
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B22E84
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00B22EB6
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00B22EE0
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B22EF1
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B22F0B
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2178440468-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4b396d3bc499b2b106a3142e8ddb38a2e7084eafb920a090386c4177656ba3c3
                                                                                                                                                                                                                                                                              • Instruction ID: cd58d28b2595e4d10e4478b889f3970bb06400700f2ffecf38507e62676ce7bb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4b396d3bc499b2b106a3142e8ddb38a2e7084eafb920a090386c4177656ba3c3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E331F430604160AFDB219F58ED85F6937E1FB9A710F1A01A4F918CB2B1CBB5A841AB41
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AF7769
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AF778F
                                                                                                                                                                                                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00AF7792
                                                                                                                                                                                                                                                                              • SysAllocString.OLEAUT32(?), ref: 00AF77B0
                                                                                                                                                                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 00AF77B9
                                                                                                                                                                                                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00AF77DE
                                                                                                                                                                                                                                                                              • SysAllocString.OLEAUT32(?), ref: 00AF77EC
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3761583154-0
                                                                                                                                                                                                                                                                              • Opcode ID: e9a630e9564861e7cb786889952bd9d7742a8c7ff9440c41ebe8224d6d6e8291
                                                                                                                                                                                                                                                                              • Instruction ID: 0d18a74ed16b8657fc741cc67c2d9205169dcc2447155de2f7807a811c14d7b2
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e9a630e9564861e7cb786889952bd9d7742a8c7ff9440c41ebe8224d6d6e8291
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A921837661421DAFDB20EFE8DC84CBF77ACEB097647148425FA15DB250DA70DC418BA4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AF7842
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AF7868
                                                                                                                                                                                                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00AF786B
                                                                                                                                                                                                                                                                              • SysAllocString.OLEAUT32 ref: 00AF788C
                                                                                                                                                                                                                                                                              • SysFreeString.OLEAUT32 ref: 00AF7895
                                                                                                                                                                                                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00AF78AF
                                                                                                                                                                                                                                                                              • SysAllocString.OLEAUT32(?), ref: 00AF78BD
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3761583154-0
                                                                                                                                                                                                                                                                              • Opcode ID: b69d337e424805c5dc2dbbb21d6a7f6631791fee270e287b03fffef55250a1fd
                                                                                                                                                                                                                                                                              • Instruction ID: 0f5836fff79d480523fa1695f13ff5ff2e5d77ea16a778ebbf127bab47d08f60
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b69d337e424805c5dc2dbbb21d6a7f6631791fee270e287b03fffef55250a1fd
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CE214935604108AFDB20AFE8DC89D7F77ECEB097607108125F615CB2A5DA74DC81CBA4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetStdHandle.KERNEL32(0000000C), ref: 00B004F2
                                                                                                                                                                                                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B0052E
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                                              • String ID: nul
                                                                                                                                                                                                                                                                              • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                                              • Opcode ID: d469b4122be143b278fdb7611757f3b67cc2c324d1e36aacdaf8ee25fcc84452
                                                                                                                                                                                                                                                                              • Instruction ID: ceab5361728381d6e1742266880ec018ed86d2510fa0f160c9ddbadef5b7bdf3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d469b4122be143b278fdb7611757f3b67cc2c324d1e36aacdaf8ee25fcc84452
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5C218D71510305ABDB20AF29DC84B9A7FF4EF68724F204A99F8A1D72E0DB709941CF20
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00B005C6
                                                                                                                                                                                                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B00601
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                                              • String ID: nul
                                                                                                                                                                                                                                                                              • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                                              • Opcode ID: 91a38202c1d18afc89cc28088e7d89d80d78d646ca71f6745d03848261a7a15b
                                                                                                                                                                                                                                                                              • Instruction ID: da8a3d7d690410f73e845d0a44f66b8728fe1c90b367b7eb9623127a7df9885a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 91a38202c1d18afc89cc28088e7d89d80d78d646ca71f6745d03848261a7a15b
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1121A1355103059FDB20AF68DC44B9A7FE5FF95720F204A59F8A1E32E0DB719961CB10
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A9600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00A9604C
                                                                                                                                                                                                                                                                                • Part of subcall function 00A9600E: GetStockObject.GDI32(00000011), ref: 00A96060
                                                                                                                                                                                                                                                                                • Part of subcall function 00A9600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A9606A
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B24112
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B2411F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B2412A
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B24139
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B24145
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                                                              • String ID: Msctls_Progress32
                                                                                                                                                                                                                                                                              • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                                                              • Opcode ID: 7f30a2fcb9b9665e9e3ce31e4244eb9c03bd10166e6dd7f4b8ee6918dd706b4c
                                                                                                                                                                                                                                                                              • Instruction ID: 354ca997d6a6907572fc265489d03664efe4e4da5bdbd672e33519cc63dbd9c1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7f30a2fcb9b9665e9e3ce31e4244eb9c03bd10166e6dd7f4b8ee6918dd706b4c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E411B6B1150229BEEF118F64DC85EE77F9DEF08798F014110FA18A6090CB729C61DBA4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00ACD7A3: _free.LIBCMT ref: 00ACD7CC
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD82D
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000), ref: 00AC29DE
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: GetLastError.KERNEL32(00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000,00000000), ref: 00AC29F0
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD838
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD843
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD897
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD8A2
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD8AD
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD8B8
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 776569668-0
                                                                                                                                                                                                                                                                              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                                              • Instruction ID: e7f8eaf82bb4517c07a957544d78df1c626cd21e054a850af92d2cc086a079a6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 04112B71940B04AADA21BFB0CE47FCB7BDCAF44700F42583DB29DBA892DA75B5058760
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00AFDA74
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000000), ref: 00AFDA7B
                                                                                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00AFDA91
                                                                                                                                                                                                                                                                              • LoadStringW.USER32(00000000), ref: 00AFDA98
                                                                                                                                                                                                                                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00AFDADC
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              • %s (%d) : ==> %s: %s %s, xrefs: 00AFDAB9
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                                                              • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                                                              • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                                                              • Opcode ID: e340587862a8dcbd466b3108610fda253c47efefc869b70d66c3f7850cc9a85c
                                                                                                                                                                                                                                                                              • Instruction ID: 763c78f1d85c8e84d51a9c434f3b3c483205f7f9bcb108db7876e430b46cc3e5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e340587862a8dcbd466b3108610fda253c47efefc869b70d66c3f7850cc9a85c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F10186F25002087FE751ABE09D89EFB776CEB08701F400492B746E3041EA749E854F74
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • InterlockedExchange.KERNEL32(0153EAB0,0153EAB0), ref: 00B0097B
                                                                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(0153EA90,00000000), ref: 00B0098D
                                                                                                                                                                                                                                                                              • TerminateThread.KERNEL32(?,000001F6), ref: 00B0099B
                                                                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00B009A9
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00B009B8
                                                                                                                                                                                                                                                                              • InterlockedExchange.KERNEL32(0153EAB0,000001F6), ref: 00B009C8
                                                                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(0153EA90), ref: 00B009CF
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3495660284-0
                                                                                                                                                                                                                                                                              • Opcode ID: be60e2234110e6615a943409144f5dc921631936b9b186bc0e9571f947dc7d64
                                                                                                                                                                                                                                                                              • Instruction ID: 3829d684a4093aea979348974828525ff59bfc6dbe03061ac1722173a015ac5e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: be60e2234110e6615a943409144f5dc921631936b9b186bc0e9571f947dc7d64
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4FF01D31442902EBD7615B94EE89BDA7E25FF05702F501015F101518A0CF749466CF90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00B11DC0
                                                                                                                                                                                                                                                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00B11DE1
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B11DF2
                                                                                                                                                                                                                                                                              • htons.WSOCK32(?,?,?,?,?), ref: 00B11EDB
                                                                                                                                                                                                                                                                              • inet_ntoa.WSOCK32(?), ref: 00B11E8C
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF39E8: _strlen.LIBCMT ref: 00AF39F2
                                                                                                                                                                                                                                                                                • Part of subcall function 00B13224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00B0EC0C), ref: 00B13240
                                                                                                                                                                                                                                                                              • _strlen.LIBCMT ref: 00B11F35
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3203458085-0
                                                                                                                                                                                                                                                                              • Opcode ID: fe835b0bb5db7797baa265eee6e1b4f976cd8f5060256d72b1070b6ae389319f
                                                                                                                                                                                                                                                                              • Instruction ID: ca939712441172f28d5154c5815cd43435f9d104930fe638794d3fa9409a20be
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fe835b0bb5db7797baa265eee6e1b4f976cd8f5060256d72b1070b6ae389319f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E6B1BE31204340AFC724DF28C895E6A7BE5EF85318F94899CF5565B2E2DB31ED82CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00A95D30
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00A95D71
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00A95D99
                                                                                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00A95ED7
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00A95EF8
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1296646539-0
                                                                                                                                                                                                                                                                              • Opcode ID: a0dd5097b75c3bba0da9718e402bf18eb14b2b62c4171f22483d89806851f00d
                                                                                                                                                                                                                                                                              • Instruction ID: b21f76728800ca74c15ca7fe53fcbc23fb9e090e6c7a34277d767c45b65e7a49
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a0dd5097b75c3bba0da9718e402bf18eb14b2b62c4171f22483d89806851f00d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 57B15639A00A4ADBDF14CFB9C4816EEB7F1FF58310F14841AE8AAD7250DB34AA51DB54
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • __allrem.LIBCMT ref: 00AC00BA
                                                                                                                                                                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC00D6
                                                                                                                                                                                                                                                                              • __allrem.LIBCMT ref: 00AC00ED
                                                                                                                                                                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC010B
                                                                                                                                                                                                                                                                              • __allrem.LIBCMT ref: 00AC0122
                                                                                                                                                                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC0140
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1992179935-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                                                                                                                                                                                                              • Instruction ID: 0d331acbee9f33bcb2d10b0dde3ef9587511584485cca988a8f26e60bc08e54f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C81C476A00706EFE7209F78CD42FAAB3A9EF45724F2A463EF551D6682E770D9008750
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00AB82D9,00AB82D9,?,?,?,00AC644F,00000001,00000001,8BE85006), ref: 00AC6258
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00AC644F,00000001,00000001,8BE85006,?,?,?), ref: 00AC62DE
                                                                                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00AC63D8
                                                                                                                                                                                                                                                                              • __freea.LIBCMT ref: 00AC63E5
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC3820: RtlAllocateHeap.NTDLL(00000000,?,00B61444,?,00AAFDF5,?,?,00A9A976,00000010,00B61440,00A913FC,?,00A913C6,?,00A91129), ref: 00AC3852
                                                                                                                                                                                                                                                                              • __freea.LIBCMT ref: 00AC63EE
                                                                                                                                                                                                                                                                              • __freea.LIBCMT ref: 00AC6413
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1414292761-0
                                                                                                                                                                                                                                                                              • Opcode ID: da52999c84860eb092dcbb26291fadd2e91a3b2b1b1a075a77c329345672d0ad
                                                                                                                                                                                                                                                                              • Instruction ID: 807a4439d6568a262dfba3c779f1b0352833f7727a643acaf7690201c6b7e04f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: da52999c84860eb092dcbb26291fadd2e91a3b2b1b1a075a77c329345672d0ad
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E251AF72A00256ABEB25CF64CD81FAF7BA9EF44750F16462DFC15DA281DB34DC40C660
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B1B6AE,?,?), ref: 00B1C9B5
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1C9F1
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1CA68
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1CA9E
                                                                                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B1BCCA
                                                                                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B1BD25
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00B1BD6A
                                                                                                                                                                                                                                                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B1BD99
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B1BDF3
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00B1BDFF
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1120388591-0
                                                                                                                                                                                                                                                                              • Opcode ID: 970c04452d52f75cc80a6bb5ea21eea1e489837d1493670419dfb3cf022f6071
                                                                                                                                                                                                                                                                              • Instruction ID: 7d3efe0ded6e00b6dd9fddd7ba80a275383fd8079adb453dbf9882778a778370
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 970c04452d52f75cc80a6bb5ea21eea1e489837d1493670419dfb3cf022f6071
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D281A231208241EFDB14DF24C985E6ABBE5FF84308F5489ACF4594B2A2DB31ED45CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(00000035), ref: 00AEF7B9
                                                                                                                                                                                                                                                                              • SysAllocString.OLEAUT32(00000001), ref: 00AEF860
                                                                                                                                                                                                                                                                              • VariantCopy.OLEAUT32(00AEFA64,00000000), ref: 00AEF889
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(00AEFA64), ref: 00AEF8AD
                                                                                                                                                                                                                                                                              • VariantCopy.OLEAUT32(00AEFA64,00000000), ref: 00AEF8B1
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00AEF8BB
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3859894641-0
                                                                                                                                                                                                                                                                              • Opcode ID: a629e0521e1d0f98206cf3b2fc9faba0d9833acb980175348dd0c21cb13a0b12
                                                                                                                                                                                                                                                                              • Instruction ID: 8d03076e2944d0dbc958b92e3611deff9fdeb4f0848f55f1e1bc3b4e113e9a3c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a629e0521e1d0f98206cf3b2fc9faba0d9833acb980175348dd0c21cb13a0b12
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6A51C531600350BEDF24AF66D895B29B7E8EF45310F24946BF906DF292DB708C40CBA6
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A97620: _wcslen.LIBCMT ref: 00A97625
                                                                                                                                                                                                                                                                                • Part of subcall function 00A96B57: _wcslen.LIBCMT ref: 00A96B6A
                                                                                                                                                                                                                                                                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00B094E5
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B09506
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B0952D
                                                                                                                                                                                                                                                                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00B09585
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                                                              • String ID: X
                                                                                                                                                                                                                                                                              • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                                                              • Opcode ID: 418eb29aa65f576fc98d446a1d4d121052b5343b195b4834f68608d035c21779
                                                                                                                                                                                                                                                                              • Instruction ID: e69b49dcb05d3ffa53674a38bcc986dc09adf5f31cda8aed3e44ef0dc200b936
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 418eb29aa65f576fc98d446a1d4d121052b5343b195b4834f68608d035c21779
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D7E182716043009FDB24DF25C981A6EBBE4FF85314F1489ADF8999B2A2DB31DD05CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              • BeginPaint.USER32(?,?,?), ref: 00AA9241
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00AA92A5
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00AA92C2
                                                                                                                                                                                                                                                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00AA92D3
                                                                                                                                                                                                                                                                              • EndPaint.USER32(?,?,?,?,?), ref: 00AA9321
                                                                                                                                                                                                                                                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00AE71EA
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9339: BeginPath.GDI32(00000000), ref: 00AA9357
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3050599898-0
                                                                                                                                                                                                                                                                              • Opcode ID: a01439c240b4bb4e0f68c9cf8b55678b40b26404a6f881cfc99da10158ef4e2f
                                                                                                                                                                                                                                                                              • Instruction ID: 8b9858bbdda574e2e7daae0a6e484a9fd6ef3175c8c265cfb5961a5454a01d6a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a01439c240b4bb4e0f68c9cf8b55678b40b26404a6f881cfc99da10158ef4e2f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E2418E30104300AFDB21DF29C885FAB7BB8EF46760F140669F9558B1F1CB719846DB62
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B0080C
                                                                                                                                                                                                                                                                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00B00847
                                                                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 00B00863
                                                                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00B008DC
                                                                                                                                                                                                                                                                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00B008F3
                                                                                                                                                                                                                                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B00921
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3368777196-0
                                                                                                                                                                                                                                                                              • Opcode ID: ddd648c070bba7866603c8b554341ec84fc1a18b36211378d77535edda5a3ce9
                                                                                                                                                                                                                                                                              • Instruction ID: a797c39f0453fe05d9ced24d740614cf5fa709795ac9888e4a5431c67d493839
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ddd648c070bba7866603c8b554341ec84fc1a18b36211378d77535edda5a3ce9
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 73416F71900205EFDF14AF94DD85AAA7BB8FF04310F1480A5ED00AB29BDB30DE65DBA4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00AEF3AB,00000000,?,?,00000000,?,00AE682C,00000004,00000000,00000000), ref: 00B2824C
                                                                                                                                                                                                                                                                              • EnableWindow.USER32(?,00000000), ref: 00B28272
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00B282D1
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(?,00000004), ref: 00B282E5
                                                                                                                                                                                                                                                                              • EnableWindow.USER32(?,00000001), ref: 00B2830B
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00B2832F
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 642888154-0
                                                                                                                                                                                                                                                                              • Opcode ID: 81c57071d069f0b92ecbdfe7834397f18e1f616d59b9fd7b66d6ea009244083b
                                                                                                                                                                                                                                                                              • Instruction ID: 3e4e2ccd0ecede59578b6d9964cefa57d97aee38ff305f99bd4f04b002b56a0e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 81c57071d069f0b92ecbdfe7834397f18e1f616d59b9fd7b66d6ea009244083b
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A7419434602654EFDB22CF15E899BE47BE0FB4A714F1841E9E50C4B2B2CB75A842CF50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • IsWindowVisible.USER32(?), ref: 00AF4C95
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00AF4CB2
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00AF4CEA
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AF4D08
                                                                                                                                                                                                                                                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00AF4D10
                                                                                                                                                                                                                                                                              • _wcsstr.LIBVCRUNTIME ref: 00AF4D1A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 72514467-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8b8e12aefb69ef660e06e8416e68b07fb6dab87c039301a585cbe3f77772aca6
                                                                                                                                                                                                                                                                              • Instruction ID: 5bf612004be420c58db89138be3f364cb0411e710cf47650713f79b29223ac7f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8b8e12aefb69ef660e06e8416e68b07fb6dab87c039301a585cbe3f77772aca6
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9C21D432204204BBEB265BA9AD49E7F7FACDF49750F108029F905CB192EE65DC0196A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A93A97,?,?,00A92E7F,?,?,?,00000000), ref: 00A93AC2
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B0587B
                                                                                                                                                                                                                                                                              • CoInitialize.OLE32(00000000), ref: 00B05995
                                                                                                                                                                                                                                                                              • CoCreateInstance.OLE32(00B2FCF8,00000000,00000001,00B2FB68,?), ref: 00B059AE
                                                                                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00B059CC
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                                                              • String ID: .lnk
                                                                                                                                                                                                                                                                              • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                                                              • Opcode ID: a786d3238070ae461dfadce3f0270aaefa08526877e6628d57bec7cf7fd1717e
                                                                                                                                                                                                                                                                              • Instruction ID: 94f9d2f093bb685b0673bc7391134991ca23f3a84eddf49ed8663a735079731b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a786d3238070ae461dfadce3f0270aaefa08526877e6628d57bec7cf7fd1717e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 55D144716087019FCB24DF14C584A2BBBE5EF89710F15889DF88A9B2A1DB31EC45CF92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00AF0FCA
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00AF0FD6
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00AF0FE5
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00AF0FEC
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00AF1002
                                                                                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?,00000000,00AF1335), ref: 00AF17AE
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00AF17BA
                                                                                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00AF17C1
                                                                                                                                                                                                                                                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00AF17DA
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000,00AF1335), ref: 00AF17EE
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF17F5
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3008561057-0
                                                                                                                                                                                                                                                                              • Opcode ID: 3ec60738df7c1d5f6cb60609528bd02f6d9971a2974dc7fe6f0e1c6b3243dbea
                                                                                                                                                                                                                                                                              • Instruction ID: ecdad003ded76848ed6fc1498340fab87007dd5050aade4fd2e3b217ee5fb812
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3ec60738df7c1d5f6cb60609528bd02f6d9971a2974dc7fe6f0e1c6b3243dbea
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2C117C71910209EFDB20AFE4CC4AFBFBBA9EB45356F104018F685A7210DB35A945CF60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00AF14FF
                                                                                                                                                                                                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00AF1506
                                                                                                                                                                                                                                                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00AF1515
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000004), ref: 00AF1520
                                                                                                                                                                                                                                                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00AF154F
                                                                                                                                                                                                                                                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00AF1563
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1413079979-0
                                                                                                                                                                                                                                                                              • Opcode ID: f2731e0504071e4a2de8373f377e0c8e2c06f324303fd758bf391223b4b6add4
                                                                                                                                                                                                                                                                              • Instruction ID: 5e25d8d4b017848bc974843291123672b932373c09cb16595b2e91bebd5804c4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f2731e0504071e4a2de8373f377e0c8e2c06f324303fd758bf391223b4b6add4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FF11177250024DEBDB218FD8DD49FEE7BA9EF48749F144015FA05A2060C7758E619B64
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,00AB3379,00AB2FE5), ref: 00AB3390
                                                                                                                                                                                                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00AB339E
                                                                                                                                                                                                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00AB33B7
                                                                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,00AB3379,00AB2FE5), ref: 00AB3409
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3852720340-0
                                                                                                                                                                                                                                                                              • Opcode ID: 6de96c8583937f92449ed59b9f04383bba1b097f944eb752d035c94746a527f2
                                                                                                                                                                                                                                                                              • Instruction ID: bb0b3707514b1385a0e25090802a5fb4f8338fd5ffd396fbdb68381c2df5842b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6de96c8583937f92449ed59b9f04383bba1b097f944eb752d035c94746a527f2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 29014C33208311BEAE252B74BD867EB2F9DDB053767200229F410861F3EF224D019144
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,00AC5686,00AD3CD6,?,00000000,?,00AC5B6A,?,?,?,?,?,00ABE6D1,?,00B58A48), ref: 00AC2D78
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2DAB
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2DD3
                                                                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,?,?,00ABE6D1,?,00B58A48,00000010,00A94F4A,?,?,00000000,00AD3CD6), ref: 00AC2DE0
                                                                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,?,?,00ABE6D1,?,00B58A48,00000010,00A94F4A,?,?,00000000,00AD3CD6), ref: 00AC2DEC
                                                                                                                                                                                                                                                                              • _abort.LIBCMT ref: 00AC2DF2
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3160817290-0
                                                                                                                                                                                                                                                                              • Opcode ID: 265d28ed91faddf86ab485aecfc9692ba1d7fbbdbc02425bf11d699f565564fa
                                                                                                                                                                                                                                                                              • Instruction ID: d20795233d05dc437388e6bef6b93bb24d0a41cad3b017f3cf43c64a00bbdcf7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 265d28ed91faddf86ab485aecfc9692ba1d7fbbdbc02425bf11d699f565564fa
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7FF0C836544B006BD6237735BD06F5F2A69AFE17A1F27451CF825A31E2EE348C024361
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AA9693
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9639: SelectObject.GDI32(?,00000000), ref: 00AA96A2
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9639: BeginPath.GDI32(?), ref: 00AA96B9
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9639: SelectObject.GDI32(?,00000000), ref: 00AA96E2
                                                                                                                                                                                                                                                                              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00B28A4E
                                                                                                                                                                                                                                                                              • LineTo.GDI32(?,00000003,00000000), ref: 00B28A62
                                                                                                                                                                                                                                                                              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00B28A70
                                                                                                                                                                                                                                                                              • LineTo.GDI32(?,00000000,00000003), ref: 00B28A80
                                                                                                                                                                                                                                                                              • EndPath.GDI32(?), ref: 00B28A90
                                                                                                                                                                                                                                                                              • StrokePath.GDI32(?), ref: 00B28AA0
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 43455801-0
                                                                                                                                                                                                                                                                              • Opcode ID: ae763b72bd9a02eed472d6783836248a458870fc13c9bfea0973a13163bd773b
                                                                                                                                                                                                                                                                              • Instruction ID: 041012a79dc75f8ee6cbef1dcf4a230aa29b0fc4d5ff2662301c7ffb844845d5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ae763b72bd9a02eed472d6783836248a458870fc13c9bfea0973a13163bd773b
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5F110C76000118FFEF129F94DC48E9A7F6CEB08350F048062FA19961A1CB719D56DBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00AF5218
                                                                                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00AF5229
                                                                                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00AF5230
                                                                                                                                                                                                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00AF5238
                                                                                                                                                                                                                                                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00AF524F
                                                                                                                                                                                                                                                                              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00AF5261
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CapsDevice$Release
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1035833867-0
                                                                                                                                                                                                                                                                              • Opcode ID: 801d21568fbd3c9e17a14056bd1c901877e05e4611998d5704d73cbb938fee74
                                                                                                                                                                                                                                                                              • Instruction ID: 55badaea71f7879096ec08ab33bb20bc3d4296d4f376f5f794e41dd8b7f99b73
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 801d21568fbd3c9e17a14056bd1c901877e05e4611998d5704d73cbb938fee74
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 13014F75E00718BBEB109BF69C49A5EBFB8EF48751F044165FB04A7281DA709801CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A91BF4
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00A91BFC
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A91C07
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A91C12
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00A91C1A
                                                                                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A91C22
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Virtual
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4278518827-0
                                                                                                                                                                                                                                                                              • Opcode ID: d3de22aaf9c0b1e3b74fe19c1574b05ec59cf6b95e5209efd853adb263c98a7c
                                                                                                                                                                                                                                                                              • Instruction ID: 356c782193372cee7784879f79e76ac26806bcc103b3aa0de4a439f81c2b3e9d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d3de22aaf9c0b1e3b74fe19c1574b05ec59cf6b95e5209efd853adb263c98a7c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8B0167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00AFEB30
                                                                                                                                                                                                                                                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00AFEB46
                                                                                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00AFEB55
                                                                                                                                                                                                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AFEB64
                                                                                                                                                                                                                                                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AFEB6E
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AFEB75
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 839392675-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4030780adaf58aa50149c068bcf2849fbd407cf7378c10b983da834a97f4160d
                                                                                                                                                                                                                                                                              • Instruction ID: 43b9eae3bea947f24c710aa2bbd16e3b7dea898be94a8be692fd448edcf88844
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4030780adaf58aa50149c068bcf2849fbd407cf7378c10b983da834a97f4160d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 36F03A72240558BBE7325BA29C0EEEF3E7CEFCAB11F004158F601E3091DBA45A02C6B5
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetClientRect.USER32(?), ref: 00AE7452
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00AE7469
                                                                                                                                                                                                                                                                              • GetWindowDC.USER32(?), ref: 00AE7475
                                                                                                                                                                                                                                                                              • GetPixel.GDI32(00000000,?,?), ref: 00AE7484
                                                                                                                                                                                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00AE7496
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(00000005), ref: 00AE74B0
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 272304278-0
                                                                                                                                                                                                                                                                              • Opcode ID: 340d62659f211356d280e9abc292de82d6d175ac03a2eef37ea9d0b833b16f59
                                                                                                                                                                                                                                                                              • Instruction ID: 67f0f5cde27d6cd0fd46286a216986b5f1909b4bcc5c5226b8fe04cadc17c08e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 340d62659f211356d280e9abc292de82d6d175ac03a2eef37ea9d0b833b16f59
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EF012431400215EFEB625FA4DC09BAE7FB5FB04321F650564FA16A31E1CF311E52AB51
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00AF187F
                                                                                                                                                                                                                                                                              • UnloadUserProfile.USERENV(?,?), ref: 00AF188B
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00AF1894
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00AF189C
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00AF18A5
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF18AC
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 146765662-0
                                                                                                                                                                                                                                                                              • Opcode ID: fbb9339a534a2bb25c1a2c903748b69fab469bc9e5a89161167b58ffdd65a237
                                                                                                                                                                                                                                                                              • Instruction ID: 5a0cb9142f60ad84ac45b490d82c2b7d0f3bbc75aecb9c24c1f7ee8613bf513d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fbb9339a534a2bb25c1a2c903748b69fab469bc9e5a89161167b58ffdd65a237
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 24E0C236004501BBDA115BA1ED0D90ABF29FF4DB22B208620F22592074CF329432DB54
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A97620: _wcslen.LIBCMT ref: 00A97625
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AFC6EE
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFC735
                                                                                                                                                                                                                                                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AFC79C
                                                                                                                                                                                                                                                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00AFC7CA
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                                                                              • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                                                              • Opcode ID: 4b11f1e6987a06815cf85da926c8e3b7d9e8688604373b7ff9872203f2f27b06
                                                                                                                                                                                                                                                                              • Instruction ID: 6fcfac575b42fb0be102c91d87c24d546ba847a2a15f4fd2a460836046755142
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4b11f1e6987a06815cf85da926c8e3b7d9e8688604373b7ff9872203f2f27b06
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F551037160830C9BD754AFAACA45B7B77E8AF85320F04092DFA91D31D0DB74D904CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • ShellExecuteExW.SHELL32(0000003C), ref: 00B1AEA3
                                                                                                                                                                                                                                                                                • Part of subcall function 00A97620: _wcslen.LIBCMT ref: 00A97625
                                                                                                                                                                                                                                                                              • GetProcessId.KERNEL32(00000000), ref: 00B1AF38
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00B1AF67
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                                                              • String ID: <$@
                                                                                                                                                                                                                                                                              • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                                                              • Opcode ID: 8bd11ba49c2806a8c873b8fca82b4f193c495bae1e1bb8ee6544d9dab9a88dc1
                                                                                                                                                                                                                                                                              • Instruction ID: 82250b8ab0113031d9ec2c3cc09bd81e67e28f91dd620ecc117e622b1e6ea917
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8bd11ba49c2806a8c873b8fca82b4f193c495bae1e1bb8ee6544d9dab9a88dc1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EC713771A00615DFCF14EF64C584A9EBBF0EF08314F548499E81AAB392CB74ED85CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00AF7206
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00AF723C
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00AF724D
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00AF72CF
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                                                              • String ID: DllGetClassObject
                                                                                                                                                                                                                                                                              • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                                                              • Opcode ID: 1f1bfb6b93cc83dcb652e5ab5c59c2d1a71a73d7728e9b73786ebda952ebd005
                                                                                                                                                                                                                                                                              • Instruction ID: 8d8870ef79d877f3219e06e5b4bd6983786f83f68a3e77d9a3afd2b87b36f5a1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1f1bfb6b93cc83dcb652e5ab5c59c2d1a71a73d7728e9b73786ebda952ebd005
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 03415E71604208AFDB15CF94C885AEE7BB9EF48311F1480ADBE099F20AD7B1D945CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B23E35
                                                                                                                                                                                                                                                                              • IsMenu.USER32(?), ref: 00B23E4A
                                                                                                                                                                                                                                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B23E92
                                                                                                                                                                                                                                                                              • DrawMenuBar.USER32 ref: 00B23EA5
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                                                                              • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                                                              • Opcode ID: eaf1cf9305e1a2b6f23287bade0dc4b5046bea4d2dff8046a9e078980c0ad6f1
                                                                                                                                                                                                                                                                              • Instruction ID: 6fc8003554f8311c2c224e94b421c534bb71df0d00472f3436f8e358f1792d73
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: eaf1cf9305e1a2b6f23287bade0dc4b5046bea4d2dff8046a9e078980c0ad6f1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1E418C75A00219EFDB10EF50E880AEABBF5FF48750F054169E90997250C738EE49CF60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00AF3CCA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00AF1E66
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00AF1E79
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00AF1EA9
                                                                                                                                                                                                                                                                                • Part of subcall function 00A96B57: _wcslen.LIBCMT ref: 00A96B6A
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                              • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                                                              • Opcode ID: bda938d8f5682c9ee57543c80a00e33618d17f11e76f6d43f5ad3f8f65200094
                                                                                                                                                                                                                                                                              • Instruction ID: b1fe36aa74d273b36e085120bbaf645ad2eb2dcc6ba82ec344033513dda812c7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bda938d8f5682c9ee57543c80a00e33618d17f11e76f6d43f5ad3f8f65200094
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 15210272A00108BEDF28ABA5DD56CFFBBF8DF46350B104519F925A71E1DB38490A8620
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B22F8D
                                                                                                                                                                                                                                                                              • LoadLibraryW.KERNEL32(?), ref: 00B22F94
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B22FA9
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00B22FB1
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                                                              • String ID: SysAnimate32
                                                                                                                                                                                                                                                                              • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                                                              • Opcode ID: 83b3d19c1d3230a17b8065856489a625eb83972cd87a87e53a2d3ee441f862f7
                                                                                                                                                                                                                                                                              • Instruction ID: 7e0c14a635399636fc041bffb9d1bc2ce34a1ecd11cae3f6dc0f5aa0d291d757
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 83b3d19c1d3230a17b8065856489a625eb83972cd87a87e53a2d3ee441f862f7
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 75219A72200225BBEB218F64ED80EBB37F9EB59364F104658FA58D31A0DB71DC519760
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00AB4D1E,00AC28E9,?,00AB4CBE,00AC28E9,00B588B8,0000000C,00AB4E15,00AC28E9,00000002), ref: 00AB4D8D
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00AB4DA0
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,00AB4D1E,00AC28E9,?,00AB4CBE,00AC28E9,00B588B8,0000000C,00AB4E15,00AC28E9,00000002,00000000), ref: 00AB4DC3
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                                                              • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                                                              • Opcode ID: c0f7c74b1d6bc76abba3704da4f77fb07e5ac4c62fe1407f21fd9eba1ae82164
                                                                                                                                                                                                                                                                              • Instruction ID: 75dc8602299f3ca5f5039b7a188325a9aa8d540d9db56424f8bcdf9d39c3a2c6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c0f7c74b1d6bc76abba3704da4f77fb07e5ac4c62fe1407f21fd9eba1ae82164
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6BF04434540208BBDB119F90DC49BEEBFF9EF48752F040094F805A3261CF315D51CA90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadLibraryA.KERNEL32 ref: 00AED3AD
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00AED3BF
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00AED3E5
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                              • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                                                                              • API String ID: 145871493-2590602151
                                                                                                                                                                                                                                                                              • Opcode ID: 96946c27d33092bca8e0f0dfe3da04fc5f1c0735c786d293348b3e797dafe570
                                                                                                                                                                                                                                                                              • Instruction ID: c74aa532229ee003a74de93c898b3fdcb74fb1414cc52bd6678ce30fb7a61128
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 96946c27d33092bca8e0f0dfe3da04fc5f1c0735c786d293348b3e797dafe570
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BCF0AB31806A629FD33017128C48AED3B30AF01703B648085F907FB150DF30CD4086E2
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00A94EDD,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94E9C
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A94EAE
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00A94EDD,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94EC0
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                                              • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                                                              • Opcode ID: a119aca702ddd5ed5a7db699086bd9bc422802919fe9d15e65de7a0fc2ca63da
                                                                                                                                                                                                                                                                              • Instruction ID: 86f506daae14944d955aa73af521ade947b5a6e90ba09035b22166ab44b767c3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a119aca702ddd5ed5a7db699086bd9bc422802919fe9d15e65de7a0fc2ca63da
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C4E08635B055225B963117257C19F9F79D4AF95F637050155FD05E3210DF64CD0380E0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00AD3CDE,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94E62
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A94E74
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00AD3CDE,?,00B61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A94E87
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                                              • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                                                              • Opcode ID: c7a912b055f52f47f4107b58814510c01829635d61bd0ae5e833bf5cccac5f22
                                                                                                                                                                                                                                                                              • Instruction ID: b116294c67c3bbdc05339dbfedc420f67f0da193af6776a2a0851a3e45e658ac
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c7a912b055f52f47f4107b58814510c01829635d61bd0ae5e833bf5cccac5f22
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CAD01236A12A31575A321B257C1DEDF6E98AF89F523050555FD05B7224DF60CD13C5D0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B02C05
                                                                                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?), ref: 00B02C87
                                                                                                                                                                                                                                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B02C9D
                                                                                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B02CAE
                                                                                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B02CC0
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: File$Delete$Copy
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3226157194-0
                                                                                                                                                                                                                                                                              • Opcode ID: 6df41cba4dab163e2bcfc5fa4d3c61eaa63b1b6a79c8afc1421dd56b6eca727f
                                                                                                                                                                                                                                                                              • Instruction ID: bd6ba27ec46d6907ed46321159c3e5b82978ac78eae7bfd0c58dad0e8b4c7110
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6df41cba4dab163e2bcfc5fa4d3c61eaa63b1b6a79c8afc1421dd56b6eca727f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5EB13071E00119AFDF25DBA4CD89EDE7BBDEF49350F1040A6F909E7191EA309A488F61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00B1A427
                                                                                                                                                                                                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B1A435
                                                                                                                                                                                                                                                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B1A468
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00B1A63D
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3488606520-0
                                                                                                                                                                                                                                                                              • Opcode ID: dc30085dca002f3c152f98b02490be8dfaf933440373027f6f5cb0994be0057d
                                                                                                                                                                                                                                                                              • Instruction ID: fd8f16aab90bae0519cc6066a30dca5866ea109da058cc1d76f2ed63be962a27
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dc30085dca002f3c152f98b02490be8dfaf933440373027f6f5cb0994be0057d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 47A1BF716043009FDB20DF24D986F2AB7E5AF88714F54885DF59A9B3D2DBB0EC418B92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00B33700), ref: 00ACBB91
                                                                                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00B6121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00ACBC09
                                                                                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00B61270,000000FF,?,0000003F,00000000,?), ref: 00ACBC36
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACBB7F
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000), ref: 00AC29DE
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: GetLastError.KERNEL32(00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000,00000000), ref: 00AC29F0
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACBD4B
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1286116820-0
                                                                                                                                                                                                                                                                              • Opcode ID: 3ff0ea9839b6d8603829cbc09bdecf117d4a98ca08de3d2f09c96e71811c496c
                                                                                                                                                                                                                                                                              • Instruction ID: 14fe73f4b9f85f2455bdad307689b4f97df3a14518e4e883eab5157d52fb1bdc
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3ff0ea9839b6d8603829cbc09bdecf117d4a98ca08de3d2f09c96e71811c496c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6051E671914209AFCB10DF698D82FAEBBBCEF44310F16466EE514E72A1EF715D408B60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AFCF22,?), ref: 00AFDDFD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AFCF22,?), ref: 00AFDE16
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFE199: GetFileAttributesW.KERNEL32(?,00AFCF95), ref: 00AFE19A
                                                                                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00AFE473
                                                                                                                                                                                                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00AFE4AC
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFE5EB
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFE603
                                                                                                                                                                                                                                                                              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00AFE650
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3183298772-0
                                                                                                                                                                                                                                                                              • Opcode ID: c0e2cd374c12a0ab445462a2e1f9cac104f2addea2bde09641938bb0163d8c6f
                                                                                                                                                                                                                                                                              • Instruction ID: 717f838ce9e162758c96cc4a47c353b6199afed6973632689d86409f070a29aa
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c0e2cd374c12a0ab445462a2e1f9cac104f2addea2bde09641938bb0163d8c6f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FA5154B25083495BC724EBA4DD819EFB7ECAF84340F00491EF689D3152EF75A688C766
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B1B6AE,?,?), ref: 00B1C9B5
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1C9F1
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1CA68
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1C998: _wcslen.LIBCMT ref: 00B1CA9E
                                                                                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B1BAA5
                                                                                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B1BB00
                                                                                                                                                                                                                                                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B1BB63
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?), ref: 00B1BBA6
                                                                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00B1BBB3
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 826366716-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8eec0ecf9ef823e5be491b343fe3d81f08d7f0f93e3c64ccd5539bf0b93295e7
                                                                                                                                                                                                                                                                              • Instruction ID: 959856ab4f7e87bf76db80aa782891d29b65cc238ff0f2404b86c1a47c8c2148
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8eec0ecf9ef823e5be491b343fe3d81f08d7f0f93e3c64ccd5539bf0b93295e7
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6D618131218241AFD714DF24C990E6BBBE5FF84308F54859DF4998B2A2DB31ED85CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00AF8BCD
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32 ref: 00AF8C3E
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32 ref: 00AF8C9D
                                                                                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00AF8D10
                                                                                                                                                                                                                                                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00AF8D3B
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4136290138-0
                                                                                                                                                                                                                                                                              • Opcode ID: 2c4b850bbe4e8a149778f8be40e3f40d97755f5c187cc6c75f33c9307a4baf33
                                                                                                                                                                                                                                                                              • Instruction ID: d8f345b9f184f3ca91e545aa9702db8ebe168dcd97b82ab6196686e8964f02d5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2c4b850bbe4e8a149778f8be40e3f40d97755f5c187cc6c75f33c9307a4baf33
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5F517BB5A00619EFCB10CF68C894AAABBF8FF89310B158559F915DB354EB34E911CF90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00B08BAE
                                                                                                                                                                                                                                                                              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00B08BDA
                                                                                                                                                                                                                                                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00B08C32
                                                                                                                                                                                                                                                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00B08C57
                                                                                                                                                                                                                                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00B08C5F
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2832842796-0
                                                                                                                                                                                                                                                                              • Opcode ID: a4f46fb64cfe9a89d907cb274b6d739845c8295a325a59ca4f8542c87b3f4b80
                                                                                                                                                                                                                                                                              • Instruction ID: ae83652758f7b94697380a3214e1757669b0e043d42dd86c024e67188215e304
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a4f46fb64cfe9a89d907cb274b6d739845c8295a325a59ca4f8542c87b3f4b80
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 36513A35A002149FDF15DF64C981A6DBBF5FF49314F088498E84AAB3A2DB31ED51CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00B18F40
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00B18FD0
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B18FEC
                                                                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00B19032
                                                                                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00B19052
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00B01043,?,7529E610), ref: 00AAF6E6
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00AEFA64,00000000,00000000,?,?,00B01043,?,7529E610,?,00AEFA64), ref: 00AAF70D
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 666041331-0
                                                                                                                                                                                                                                                                              • Opcode ID: 33f427d6e33f70445389b7373451c49b850f1097725c500dac3d21f7a0b117d6
                                                                                                                                                                                                                                                                              • Instruction ID: fbf6178b282b788c696b58b1d700ed5b806258b2a1e679558bb217f76a4f01d6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 33f427d6e33f70445389b7373451c49b850f1097725c500dac3d21f7a0b117d6
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 01516A34A04245DFCB15DF58C5948EDBBF1FF49314B5580A8E80AAB362DB31ED86CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00B26C33
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000EC,?), ref: 00B26C4A
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00B26C73
                                                                                                                                                                                                                                                                              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00B0AB79,00000000,00000000), ref: 00B26C98
                                                                                                                                                                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00B26CC7
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3688381893-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4332d3284bf99ab585cd5ac5656049d9fc8c3a407daabc2815fdac9875d38e46
                                                                                                                                                                                                                                                                              • Instruction ID: 6dc81c7bc2322a27db83851a1bc11d77975b4b27bdc056b7cb79173b225e327e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4332d3284bf99ab585cd5ac5656049d9fc8c3a407daabc2815fdac9875d38e46
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E841C435A04124AFD725EF28DC99FA97FE5EB09360F1502A8F89DA72E0C771ED41CA50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 269201875-0
                                                                                                                                                                                                                                                                              • Opcode ID: 64d8535658da2c3b706e10c9957a9041f6e2ca76c1c92dc4e68b4353f6fc2aef
                                                                                                                                                                                                                                                                              • Instruction ID: 9ff1ebfa2830898d1e992a7ff559c399cc2ca66209df1a454167a04b4f2b94d3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 64d8535658da2c3b706e10c9957a9041f6e2ca76c1c92dc4e68b4353f6fc2aef
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C3419E32A002009FCB24DF78C981F59B7A5EF89314B1A45ADE615EB392DB31AD01CB80
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00AA9141
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(00000000,?), ref: 00AA915E
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000001), ref: 00AA9183
                                                                                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000002), ref: 00AA919D
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4210589936-0
                                                                                                                                                                                                                                                                              • Opcode ID: 372fe6cf160637c08fc4035ed3f2d6f6151a586ba204a0860d4e1dd48ee400a0
                                                                                                                                                                                                                                                                              • Instruction ID: 396b021e8864be681ce77f3ed2b1db3d76581f421c0797a5aa88ed885bb91bc3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 372fe6cf160637c08fc4035ed3f2d6f6151a586ba204a0860d4e1dd48ee400a0
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C2414F31A0865ABBDF159F65C844BEEB774FF06320F208316E429A72E0C7346D50DB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetInputState.USER32 ref: 00B038CB
                                                                                                                                                                                                                                                                              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00B03922
                                                                                                                                                                                                                                                                              • TranslateMessage.USER32(?), ref: 00B0394B
                                                                                                                                                                                                                                                                              • DispatchMessageW.USER32(?), ref: 00B03955
                                                                                                                                                                                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B03966
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2256411358-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8cd9d56a91f74de99de69f846ce725d8c68edd999f7b944dfdd24cfc5f0e73ea
                                                                                                                                                                                                                                                                              • Instruction ID: 7fe129b7036bf6c64b67cc9c2e70857e7b4d32817d8a65ef856d7a0549c8df82
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8cd9d56a91f74de99de69f846ce725d8c68edd999f7b944dfdd24cfc5f0e73ea
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD3193709043419EEB35CB34984DBA63FECEB15744F0849E9E463831E0EBE89A85CB61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00B0C21E,00000000), ref: 00B0CF38
                                                                                                                                                                                                                                                                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00B0CF6F
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000,?,?,?,00B0C21E,00000000), ref: 00B0CFB4
                                                                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00B0C21E,00000000), ref: 00B0CFC8
                                                                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00B0C21E,00000000), ref: 00B0CFF2
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3191363074-0
                                                                                                                                                                                                                                                                              • Opcode ID: e2851402d25f9a627fa1ee9706d1d242e0a6333524fda88a225c2d5ee88b2717
                                                                                                                                                                                                                                                                              • Instruction ID: b05609cbe861e59501e2103d5d5990cba6dd385c92850b1df3af1fae322f1b41
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e2851402d25f9a627fa1ee9706d1d242e0a6333524fda88a225c2d5ee88b2717
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C8319A71600206EFDB24CFA5C884AAFBFF9EF00354B1045AEF106D3181DB30AE499B61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00AF1915
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000001,00000201,00000001), ref: 00AF19C1
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,?), ref: 00AF19C9
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000001,00000202,00000000), ref: 00AF19DA
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00AF19E2
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3382505437-0
                                                                                                                                                                                                                                                                              • Opcode ID: de29d82ab0118bd8dcd03ae1c4c802b6d38ed6d9397afdd84c16a3f10213f501
                                                                                                                                                                                                                                                                              • Instruction ID: 3b6cf30c98d012faf3234e546d3e41c263d66674bd99ffb19913c98c920face9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: de29d82ab0118bd8dcd03ae1c4c802b6d38ed6d9397afdd84c16a3f10213f501
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5731A071A0021DEFDB14CFA8CD99AEE7BB5EB44315F104229FA21A72D1C7B09954DB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B25745
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B2579D
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B257AF
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B257BA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B25816
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 763830540-0
                                                                                                                                                                                                                                                                              • Opcode ID: 5cf20fedd45b93965566ed62a60b831e9337b8b7ef391b88cb5a317e21bb9db3
                                                                                                                                                                                                                                                                              • Instruction ID: 809bf0936bb9350d9e2e70e48ad05dcd79f93a80c03284d82297a3ac41ec6e73
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5cf20fedd45b93965566ed62a60b831e9337b8b7ef391b88cb5a317e21bb9db3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F92181719046289ADB309F64EC84AEDBBF8FF04320F108296E92DAB195D7709985CF50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • IsWindow.USER32(00000000), ref: 00B10951
                                                                                                                                                                                                                                                                              • GetForegroundWindow.USER32 ref: 00B10968
                                                                                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00B109A4
                                                                                                                                                                                                                                                                              • GetPixel.GDI32(00000000,?,00000003), ref: 00B109B0
                                                                                                                                                                                                                                                                              • ReleaseDC.USER32(00000000,00000003), ref: 00B109E8
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4156661090-0
                                                                                                                                                                                                                                                                              • Opcode ID: d6e0c435a84083968e720a8b8c1862ec0ea94889772b4e68005f53afcfce6454
                                                                                                                                                                                                                                                                              • Instruction ID: dd20d7d0dc0f74ec2223d5e3f982444a2845b98e7123974e96c700f07f2e3858
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d6e0c435a84083968e720a8b8c1862ec0ea94889772b4e68005f53afcfce6454
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6021C335600204AFDB14EF68D984AAEBBF5EF44740F008468F84AE7762CB70AC44CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 00ACCDC6
                                                                                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00ACCDE9
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC3820: RtlAllocateHeap.NTDLL(00000000,?,00B61444,?,00AAFDF5,?,?,00A9A976,00000010,00B61440,00A913FC,?,00A913C6,?,00A91129), ref: 00AC3852
                                                                                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00ACCE0F
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACCE22
                                                                                                                                                                                                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00ACCE31
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 336800556-0
                                                                                                                                                                                                                                                                              • Opcode ID: aae5c940d3c36cabc273e409253928ceb68e1ac57068da0e98ee329a251f1d64
                                                                                                                                                                                                                                                                              • Instruction ID: 4d32744565fc8d2eae1c279ed5a1b2057f2e68b20948d12177068c2c6b2f303b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aae5c940d3c36cabc273e409253928ceb68e1ac57068da0e98ee329a251f1d64
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B401B1726016157FA32117BA6C88E7F6E6DDEC7BB1316012DF909D7201EE618D0282B0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AA9693
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,00000000), ref: 00AA96A2
                                                                                                                                                                                                                                                                              • BeginPath.GDI32(?), ref: 00AA96B9
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,00000000), ref: 00AA96E2
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3225163088-0
                                                                                                                                                                                                                                                                              • Opcode ID: a2f29a76f9c611ba293b623c31e22cfd63d6906264e46f2a165fd0423880e863
                                                                                                                                                                                                                                                                              • Instruction ID: 749d7d24a25746dbdd34e8c3896047f01451449f86c29d798e4b3e10149bf880
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a2f29a76f9c611ba293b623c31e22cfd63d6906264e46f2a165fd0423880e863
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3C215030802305EBEB119F69DC15BAE7BB8BF51355F184626F410A71F0DBB45892DFA4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(00000008), ref: 00AA98CC
                                                                                                                                                                                                                                                                              • SetTextColor.GDI32(?,?), ref: 00AA98D6
                                                                                                                                                                                                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00AA98E9
                                                                                                                                                                                                                                                                              • GetStockObject.GDI32(00000005), ref: 00AA98F1
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 00AA9952
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Color$LongModeObjectStockTextWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1860813098-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8c0c790d0deb136b22effd91c4727c588caac1aba3b77d2e3b4e9c5a731f4f30
                                                                                                                                                                                                                                                                              • Instruction ID: b33db7addfa89ab6bfc3dc1b4954d9328515937bdf3080a0de64d76bfcff97e7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8c0c790d0deb136b22effd91c4727c588caac1aba3b77d2e3b4e9c5a731f4f30
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D8117832185200AFCB224F24EC5AAEF3F60EF13321B18015DF4429B1F1CB795952CB51
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _memcmp
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2931989736-0
                                                                                                                                                                                                                                                                              • Opcode ID: 5dfcc4876ed139e322dedbfe7c3c3855e013d1777f78afe3e35e83e63cf12eec
                                                                                                                                                                                                                                                                              • Instruction ID: 5fbcaa6f8059332e4b85a04be0e1f91b10416673bbc1217e188b7338fc7a2d7f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5dfcc4876ed139e322dedbfe7c3c3855e013d1777f78afe3e35e83e63cf12eec
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EB019671A45A1DBA964866619E52FFB63ACDB21394B404430FF09AE241F760ED1082A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,?,00ABF2DE,00AC3863,00B61444,?,00AAFDF5,?,?,00A9A976,00000010,00B61440,00A913FC,?,00A913C6), ref: 00AC2DFD
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2E32
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2E59
                                                                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,00A91129), ref: 00AC2E66
                                                                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,00A91129), ref: 00AC2E6F
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorLast$_free
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3170660625-0
                                                                                                                                                                                                                                                                              • Opcode ID: 96e76712aee7bf3679ae91f428b18f3f4a2f82cc4890e86b59a34c7691b5ad01
                                                                                                                                                                                                                                                                              • Instruction ID: b0d69cfa80a0e97444d32d45853343e9246ebb4e3c415af1e5a920970b33f451
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 96e76712aee7bf3679ae91f428b18f3f4a2f82cc4890e86b59a34c7691b5ad01
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B101283A205B006BDA2267756D45F2F2E7EABD13B1B27442CF821B31D2EF348C014320
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?,?,?,00AF035E), ref: 00AF002B
                                                                                                                                                                                                                                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?,?), ref: 00AF0046
                                                                                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?,?), ref: 00AF0054
                                                                                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?), ref: 00AF0064
                                                                                                                                                                                                                                                                              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AEFF41,80070057,?,?), ref: 00AF0070
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3897988419-0
                                                                                                                                                                                                                                                                              • Opcode ID: 881f813506c03a186f7e89bbcd48025fc889296797f7677133cb874a152d3c13
                                                                                                                                                                                                                                                                              • Instruction ID: 933c1d734a687c5a11a71a2b502a30111946f38690cd916baaa38bccadf410c3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 881f813506c03a186f7e89bbcd48025fc889296797f7677133cb874a152d3c13
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D1015672600208ABDB204FA8DC04FBE7EADEB44792F148124FA05D7211EB71DD418BA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00AFE997
                                                                                                                                                                                                                                                                              • QueryPerformanceFrequency.KERNEL32(?), ref: 00AFE9A5
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000), ref: 00AFE9AD
                                                                                                                                                                                                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00AFE9B7
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32 ref: 00AFE9F3
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2833360925-0
                                                                                                                                                                                                                                                                              • Opcode ID: c406b8daf71980f9d690fb53256b4e24446d37fcbd581b6df4477c5de29882f5
                                                                                                                                                                                                                                                                              • Instruction ID: 8cdf5378ed5b80493a74e5285386a6f7d8ceb700dfba0defbe322aa36d748dce
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c406b8daf71980f9d690fb53256b4e24446d37fcbd581b6df4477c5de29882f5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DA013531C01A2DDBCF10EBE5DC89AEDFB78BB09701F000546E602B2264CB749666CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AF1114
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF1120
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF112F
                                                                                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00AF0B9B,?,?,?), ref: 00AF1136
                                                                                                                                                                                                                                                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AF114D
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 842720411-0
                                                                                                                                                                                                                                                                              • Opcode ID: 53a8acb5abdf3accce403ef16ef0db40a48f0b8f6b29fb0ce1cd064f90e5cf66
                                                                                                                                                                                                                                                                              • Instruction ID: 501d8ee2f4b0760478d30d0569b768b34c6181be1148c09332f9a2ea7adc2bbb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 53a8acb5abdf3accce403ef16ef0db40a48f0b8f6b29fb0ce1cd064f90e5cf66
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 84011979600209BFDB214FA5DC49A6A3F6EEF893A5B204419FA45D7360DF31DC119AA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00AF0FCA
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00AF0FD6
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00AF0FE5
                                                                                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00AF0FEC
                                                                                                                                                                                                                                                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00AF1002
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 44706859-0
                                                                                                                                                                                                                                                                              • Opcode ID: 25de962465c67cffb03e3d249828bdae732d3eb9a66e9a8a3122f78e3e908496
                                                                                                                                                                                                                                                                              • Instruction ID: 69a9a42f79ae5876d6f762a56fd339e87f80090bafc49f01ba0bb2e71de3f188
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 25de962465c67cffb03e3d249828bdae732d3eb9a66e9a8a3122f78e3e908496
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1FF04936200305EBDB214FA49C4AF6B3FADEF89762F204424FA46D7251CE70DC518A60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00AF102A
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00AF1036
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF1045
                                                                                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF104C
                                                                                                                                                                                                                                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF1062
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 44706859-0
                                                                                                                                                                                                                                                                              • Opcode ID: 20bdbfe20c5da2a4658a845ee9f29498cfef87e3823091de36e18d779b423377
                                                                                                                                                                                                                                                                              • Instruction ID: e945b6c4133afc70aa4085d97082e8a7bf020f5a7e52a6015d6dea3a577aebcb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 20bdbfe20c5da2a4658a845ee9f29498cfef87e3823091de36e18d779b423377
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4CF04935200305EBDB215FA4EC49F6B3FADEF89761F600424FA45D7250CF70D8518A60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00B0017D,?,00B032FC,?,00000001,00AD2592,?), ref: 00B00324
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00B0017D,?,00B032FC,?,00000001,00AD2592,?), ref: 00B00331
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00B0017D,?,00B032FC,?,00000001,00AD2592,?), ref: 00B0033E
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00B0017D,?,00B032FC,?,00000001,00AD2592,?), ref: 00B0034B
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00B0017D,?,00B032FC,?,00000001,00AD2592,?), ref: 00B00358
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00B0017D,?,00B032FC,?,00000001,00AD2592,?), ref: 00B00365
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CloseHandle
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2962429428-0
                                                                                                                                                                                                                                                                              • Opcode ID: cc8cc7d5fd82bec4cca9f4445b3a999863f1d0008b792c771f820e78a56fe9ad
                                                                                                                                                                                                                                                                              • Instruction ID: 2097a8b88d710fe5106357ecd4cce723db7fa519f2bc9d0d7f259d7c22829da5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cc8cc7d5fd82bec4cca9f4445b3a999863f1d0008b792c771f820e78a56fe9ad
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4B01EA72800B019FCB32AF66D880902FBF9FF643163148A3FD19252970C3B0A988CF84
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD752
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000), ref: 00AC29DE
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: GetLastError.KERNEL32(00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000,00000000), ref: 00AC29F0
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD764
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD776
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD788
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00ACD79A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 776569668-0
                                                                                                                                                                                                                                                                              • Opcode ID: f64f861a01457d8f663b43bb0374380addc556b6905371a03cc741c2578f5869
                                                                                                                                                                                                                                                                              • Instruction ID: 9f4bb9a99d975ffd1caf7fc1a1f4c9c5e56bfeb0913da75b3f16df4aa52af538
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f64f861a01457d8f663b43bb0374380addc556b6905371a03cc741c2578f5869
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C4F0F972544304AB8621EB68FAC6F1A7BDEBB84711BA6085DF049E7502CB30FC808B64
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00AF5C58
                                                                                                                                                                                                                                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00AF5C6F
                                                                                                                                                                                                                                                                              • MessageBeep.USER32(00000000), ref: 00AF5C87
                                                                                                                                                                                                                                                                              • KillTimer.USER32(?,0000040A), ref: 00AF5CA3
                                                                                                                                                                                                                                                                              • EndDialog.USER32(?,00000001), ref: 00AF5CBD
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3741023627-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8474adc17000e4e0c27c2ddcd19d50e6b51bde8279cf47c6a49e08a6d5915afb
                                                                                                                                                                                                                                                                              • Instruction ID: 7b7e92eba86e51dcf5947630ff57b08ef84be28855293e5923bd124d125343aa
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8474adc17000e4e0c27c2ddcd19d50e6b51bde8279cf47c6a49e08a6d5915afb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 09013B30500B049BEB355B60DD4EFB97BB8BF05705F041559B783A24E1DBF499468A91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC22BE
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000), ref: 00AC29DE
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC29C8: GetLastError.KERNEL32(00000000,?,00ACD7D1,00000000,00000000,00000000,00000000,?,00ACD7F8,00000000,00000007,00000000,?,00ACDBF5,00000000,00000000), ref: 00AC29F0
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC22D0
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC22E3
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC22F4
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC2305
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 776569668-0
                                                                                                                                                                                                                                                                              • Opcode ID: 1a125fd02aac21f66379cbcd3b1a2c43727ccec8bd19ca471bd68716523f9200
                                                                                                                                                                                                                                                                              • Instruction ID: 98f17c4f723f51bc8bbaa166c05b98ce504020f88f75bbbbb8eb8103283a7e4b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1a125fd02aac21f66379cbcd3b1a2c43727ccec8bd19ca471bd68716523f9200
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DFF03AB18502209F8612BF58BD01F593FA5B768761706094EF414D32F1CFB80911EFA4
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • EndPath.GDI32(?), ref: 00AA95D4
                                                                                                                                                                                                                                                                              • StrokeAndFillPath.GDI32(?,?,00AE71F7,00000000,?,?,?), ref: 00AA95F0
                                                                                                                                                                                                                                                                              • SelectObject.GDI32(?,00000000), ref: 00AA9603
                                                                                                                                                                                                                                                                              • DeleteObject.GDI32 ref: 00AA9616
                                                                                                                                                                                                                                                                              • StrokePath.GDI32(?), ref: 00AA9631
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2625713937-0
                                                                                                                                                                                                                                                                              • Opcode ID: 77771f7d4a269d59c0da0a1b93a29fdd2f97a1ebe7ca818e72577e7f4caeb9b6
                                                                                                                                                                                                                                                                              • Instruction ID: a26cc64cb7d1ea979525699d329760b6fee93a7c7f5e34475ab8c92151c9a607
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 77771f7d4a269d59c0da0a1b93a29fdd2f97a1ebe7ca818e72577e7f4caeb9b6
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B0F03C30405304EBEB265F69ED1D76A3F65AB02322F088224F425570F1CFB889A7DFA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: __freea$_free
                                                                                                                                                                                                                                                                              • String ID: a/p$am/pm
                                                                                                                                                                                                                                                                              • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                                                              • Opcode ID: 77e30a7c95eafddb9ae4b3649734489942031bd2cd603e84a236347aeb4a63c1
                                                                                                                                                                                                                                                                              • Instruction ID: 292de338c8e2bca37afefb27bf719836b3a294b832850bc650a07d8ef5fd123b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 77e30a7c95eafddb9ae4b3649734489942031bd2cd603e84a236347aeb4a63c1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7DD1DF35B00286CADB649F68C955FFAB7B4EF07304F2A425DE9019F752D2359D80CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB0242: EnterCriticalSection.KERNEL32(00B6070C,00B61884,?,?,00AA198B,00B62518,?,?,?,00A912F9,00000000), ref: 00AB024D
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB0242: LeaveCriticalSection.KERNEL32(00B6070C,?,00AA198B,00B62518,?,?,?,00A912F9,00000000), ref: 00AB028A
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB00A3: __onexit.LIBCMT ref: 00AB00A9
                                                                                                                                                                                                                                                                              • __Init_thread_footer.LIBCMT ref: 00B17BFB
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB01F8: EnterCriticalSection.KERNEL32(00B6070C,?,?,00AA8747,00B62514), ref: 00AB0202
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB01F8: LeaveCriticalSection.KERNEL32(00B6070C,?,00AA8747,00B62514), ref: 00AB0235
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                                                                              • String ID: 5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                                                                              • API String ID: 535116098-3733170431
                                                                                                                                                                                                                                                                              • Opcode ID: ff36b6132bcc00e1135aaf16d56c7d82b64f40794b4e7e2d37a22b2b49784e3f
                                                                                                                                                                                                                                                                              • Instruction ID: a3a1c71be38ea625166cdce0a9ca1e973903cc13b9b06556c117befbcac954a0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ff36b6132bcc00e1135aaf16d56c7d82b64f40794b4e7e2d37a22b2b49784e3f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F7919C70A44209EFCB14EF94D9909EDB7F1FF48300F908099F8069B292DB31AE81CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00AF21D0,?,?,00000034,00000800,?,00000034), ref: 00AFB42D
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00AF2760
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00AF21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00AFB3F8
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFB32A: GetWindowThreadProcessId.USER32(?,?), ref: 00AFB355
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00AF2194,00000034,?,?,00001004,00000000,00000000), ref: 00AFB365
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00AF2194,00000034,?,?,00001004,00000000,00000000), ref: 00AFB37B
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00AF27CD
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00AF281A
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                                                              • String ID: @
                                                                                                                                                                                                                                                                              • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                                                              • Opcode ID: a4e5f6f124f6c06ac3986ebc5d02c22bedefa558ef2f801c537622535ed6b076
                                                                                                                                                                                                                                                                              • Instruction ID: 49882cb18ec5e741de5871c61c39f1549efb0980e9ad17343a3f3fe91fa573d6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a4e5f6f124f6c06ac3986ebc5d02c22bedefa558ef2f801c537622535ed6b076
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7241197290021CAFDB10DFA4CD86BEEBBB8AF09740F104199FA55B7181DB706E45CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00AC1769
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC1834
                                                                                                                                                                                                                                                                              • _free.LIBCMT ref: 00AC183E
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free$FileModuleName
                                                                                                                                                                                                                                                                              • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                                              • API String ID: 2506810119-517116171
                                                                                                                                                                                                                                                                              • Opcode ID: 6d8ef6ba9edc135d044398f4e37d614217931d49c52511064f73992687e153e0
                                                                                                                                                                                                                                                                              • Instruction ID: cebe52206b5d8653fa565312130b687aaa99bfed8c542435ed80a3019b5ed1cb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6d8ef6ba9edc135d044398f4e37d614217931d49c52511064f73992687e153e0
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 74317275B44218AFDB21DF99DD85E9EBBFCEF86310B15416AF404D7212DAB08E40CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00AFC306
                                                                                                                                                                                                                                                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00AFC34C
                                                                                                                                                                                                                                                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00B61990,01535B18), ref: 00AFC395
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                                                                              • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                                                              • Opcode ID: bc64267c756f01fe50eb54280f9ec25fac84b47951f77541bb78ba195b33809a
                                                                                                                                                                                                                                                                              • Instruction ID: 4805c2ac7a65d95b44e3e6f99d4136359d3960635592f2b4279cc8931aa50ec9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bc64267c756f01fe50eb54280f9ec25fac84b47951f77541bb78ba195b33809a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1B41B2312043099FD720DF66D945B6AFBE4AF85360F10871DFAA59B2D1D730E904CB62
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B2CC08,00000000,?,?,?,?), ref: 00B244AA
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32 ref: 00B244C7
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B244D7
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Long
                                                                                                                                                                                                                                                                              • String ID: SysTreeView32
                                                                                                                                                                                                                                                                              • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                                                              • Opcode ID: 6897cbe8948edce14fbcf3502907022357ab70c71e83e7d185d2106cc61a0305
                                                                                                                                                                                                                                                                              • Instruction ID: d501b68b216a4bdad32cd4929a7a7a972f85614ed9c62750b131ee69efdb1b9f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6897cbe8948edce14fbcf3502907022357ab70c71e83e7d185d2106cc61a0305
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B2319C31210215ABDB219E38EC45BEA7BE9EF09324F204755F979A32E0DB70EC519B50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00B1335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00B13077,?,?), ref: 00B13378
                                                                                                                                                                                                                                                                              • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B1307A
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B1309B
                                                                                                                                                                                                                                                                              • htons.WSOCK32(00000000,?,?,00000000), ref: 00B13106
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                                                              • String ID: 255.255.255.255
                                                                                                                                                                                                                                                                              • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                                                              • Opcode ID: 263272d076aaf8e825d6a8f652c21d5f2979880d0ace5fee58671aaa87e3834c
                                                                                                                                                                                                                                                                              • Instruction ID: 56cda51ccd20fd1511a7f8c510443f269ad5d340da953e30ad6f4239001a5623
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 263272d076aaf8e825d6a8f652c21d5f2979880d0ace5fee58671aaa87e3834c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F631C4356002019FCB20CF28C585FEA77E0EF18714FA480D9E9159B392EB72EE85C760
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B23F40
                                                                                                                                                                                                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B23F54
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B23F78
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$Window
                                                                                                                                                                                                                                                                              • String ID: SysMonthCal32
                                                                                                                                                                                                                                                                              • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                                                              • Opcode ID: 7855d92feda7afa4f5b24455bc4b0baa06cf642c8ad950e5b957ded4f8ccf497
                                                                                                                                                                                                                                                                              • Instruction ID: 9aea47f900215e1058470aa019277e901cc3da71afea1ccdb9e5371e390e5c19
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7855d92feda7afa4f5b24455bc4b0baa06cf642c8ad950e5b957ded4f8ccf497
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3F21B132600229BFDF218F50EC46FEA3BB5EF48714F110154FA196B1D0DAB5AC55CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00B24705
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00B24713
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00B2471A
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                                                              • String ID: msctls_updown32
                                                                                                                                                                                                                                                                              • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                                                              • Opcode ID: 629b3505cd123c07ab817b498aa091271a7f95990dd9221dfe7dd08747eecd77
                                                                                                                                                                                                                                                                              • Instruction ID: 15f0cff6b2876401571a62df2c3c992f4fe1b6b9649098308ce709d749331561
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 629b3505cd123c07ab817b498aa091271a7f95990dd9221dfe7dd08747eecd77
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E22132B5600215AFDB11DF68ECC1DB737EDEF5A354B040499FA159B2A1CB71EC11CA60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen
                                                                                                                                                                                                                                                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                                                                              • API String ID: 176396367-2734436370
                                                                                                                                                                                                                                                                              • Opcode ID: 0d425afeb218f116a3991c79ac6c17dd000c0a597a66e75c2e5874c6a4d7fb3d
                                                                                                                                                                                                                                                                              • Instruction ID: 1b8834c6f164be60a31b65bac88b0f0f8d7c0bfcc085626a39533a02a279686e
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0d425afeb218f116a3991c79ac6c17dd000c0a597a66e75c2e5874c6a4d7fb3d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3D216D3220412566D731AB68DD02FBB73EC9F51300F104036FB49D7082EB55DD45C2E5
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B23840
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B23850
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B23876
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                                                              • String ID: Listbox
                                                                                                                                                                                                                                                                              • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                                                              • Opcode ID: 6af4520eeb322477d3df3cd3b861c30be7875ce4a7c1773f1ab395206e3a53d4
                                                                                                                                                                                                                                                                              • Instruction ID: d521b4dd3fd7e1b3205a9bdea53d4f211aa2b264b03c441e38e3daf8e9b652d1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6af4520eeb322477d3df3cd3b861c30be7875ce4a7c1773f1ab395206e3a53d4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7921A7726102287BEF218F54DC85FBB37EEEF89B50F118154F9059B1A0CA75DC528790
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00B04A08
                                                                                                                                                                                                                                                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00B04A5C
                                                                                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,?,?,00B2CC08), ref: 00B04AD0
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                                                              • String ID: %lu
                                                                                                                                                                                                                                                                              • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                                                              • Opcode ID: 09e0ea43646a75008e3611e686c36d0d55843e545f1ca2aa4ccb4e628d24e611
                                                                                                                                                                                                                                                                              • Instruction ID: 0a573102e60846520a6487169b3880e3425336416291085342decd5d248d56f4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 09e0ea43646a75008e3611e686c36d0d55843e545f1ca2aa4ccb4e628d24e611
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2B310375A00109AFDB10DF54C985EAE7BF8EF49308F148099F909DB262DB71ED45CB61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B2424F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B24264
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B24271
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                                                                                              • String ID: msctls_trackbar32
                                                                                                                                                                                                                                                                              • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                                                              • Opcode ID: 6c580d5b4c45e63aebe293e0481d0db4ca4c98826c7297ed57e5cf94063f344f
                                                                                                                                                                                                                                                                              • Instruction ID: 2b6b0940aafcb23b7d05afd04224ff14813153227d49f0ebcb70eecd11322477
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6c580d5b4c45e63aebe293e0481d0db4ca4c98826c7297ed57e5cf94063f344f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3611E031250218BEEF215E29DC46FAB3BECEF85B64F010524FA59E70A0D7B1DC219B20
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A96B57: _wcslen.LIBCMT ref: 00A96B6A
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00AF2DC5
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00AF2DD6
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF2DA7: GetCurrentThreadId.KERNEL32 ref: 00AF2DDD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00AF2DE4
                                                                                                                                                                                                                                                                              • GetFocus.USER32 ref: 00AF2F78
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF2DEE: GetParent.USER32(00000000), ref: 00AF2DF9
                                                                                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00AF2FC3
                                                                                                                                                                                                                                                                              • EnumChildWindows.USER32(?,00AF303B), ref: 00AF2FEB
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                                                              • String ID: %s%d
                                                                                                                                                                                                                                                                              • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                                                              • Opcode ID: ee534dc8f15562903e5fcb3dbc087c227c23c70c83ee333ad95ea50cd40cdc9d
                                                                                                                                                                                                                                                                              • Instruction ID: 5de9429e97806b643be1c5ff14008dbca8b90db59f47f1a7e343a0deb0869b8a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ee534dc8f15562903e5fcb3dbc087c227c23c70c83ee333ad95ea50cd40cdc9d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E611A2767002096BCF157FA48D95FFD37AAAF84304F048075FA099B192DE709A498B60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00B258C1
                                                                                                                                                                                                                                                                              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00B258EE
                                                                                                                                                                                                                                                                              • DrawMenuBar.USER32(?), ref: 00B258FD
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                                                                              • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                                                              • Opcode ID: 157526a0e2d310b39716cd990bb033f359ee11d111a85650f9e48621a4bb83c8
                                                                                                                                                                                                                                                                              • Instruction ID: d0af2bebea29be077f22a736171600fc3a219ee45ca6df7eeec498ea51d62c45
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 157526a0e2d310b39716cd990bb033f359ee11d111a85650f9e48621a4bb83c8
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F5011731500228EEDB319F51EC85BAEBBB4FF45361F1080A9E849D6251DB309A95EF61
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: e348e2304109c27f933b86416563499b81d2cac1fa922f6863f82cdcd289bddb
                                                                                                                                                                                                                                                                              • Instruction ID: 9602ead837abb220e60fdd9bfd736fa8a01e6f515bfd32553a911ccccb6e2a54
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e348e2304109c27f933b86416563499b81d2cac1fa922f6863f82cdcd289bddb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 91C10775A0021AAFDB14CFA8C894EBEB7B5FF48704F218598F605AB252D731ED41DB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1036877536-0
                                                                                                                                                                                                                                                                              • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                                              • Instruction ID: adc8a1f74a769bb183fde06ac0158e3e566e884460b2f8a90f80b190fb0a7eee
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 06A16A72D003869FEB25CF18C8A1FAEBBF5EF69350F1A426DE5959B241C2388D41C794
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1998397398-0
                                                                                                                                                                                                                                                                              • Opcode ID: b24c8d9154879574a764758b2b72bfb340f1aee0b512b2f4555991ddf4c81f6f
                                                                                                                                                                                                                                                                              • Instruction ID: ae4f531df5abef09e583ac59ad1dc8b63537618d4a4a5c78f95238c5ad009ed9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b24c8d9154879574a764758b2b72bfb340f1aee0b512b2f4555991ddf4c81f6f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 63A14C756183009FCB10DF28C585A6EB7E5FF88B14F058899F98A9B362DB30ED45CB51
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00B2FC08,?), ref: 00AF05F0
                                                                                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00B2FC08,?), ref: 00AF0608
                                                                                                                                                                                                                                                                              • CLSIDFromProgID.OLE32(?,?,00000000,00B2CC40,000000FF,?,00000000,00000800,00000000,?,00B2FC08,?), ref: 00AF062D
                                                                                                                                                                                                                                                                              • _memcmp.LIBVCRUNTIME ref: 00AF064E
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 314563124-0
                                                                                                                                                                                                                                                                              • Opcode ID: 65d0df9d1a5b3abad3755c9d2951a9539a4b17898e0d4d6eb2dd160b22050f77
                                                                                                                                                                                                                                                                              • Instruction ID: 5dfb0b88be924ecdb41b0d84a92a238e36420fb22cc7a58a4449f59b3548be5b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 65d0df9d1a5b3abad3755c9d2951a9539a4b17898e0d4d6eb2dd160b22050f77
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FD81E975A00109EFCB04DFD4C984EEEB7B9FF89315B208558F616AB251DB71AE06CB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00B1A6AC
                                                                                                                                                                                                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00B1A6BA
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00B1A79C
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00B1A7AB
                                                                                                                                                                                                                                                                                • Part of subcall function 00AACE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00AD3303,?), ref: 00AACE8A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1991900642-0
                                                                                                                                                                                                                                                                              • Opcode ID: 9042b22d5411fd6cb2ae2ec2b5218aba470e15e71574610dcb7afaa3f0444923
                                                                                                                                                                                                                                                                              • Instruction ID: e3c8de2a7cd93d39cb8d613e4c1c30391d611f46a6f65d8b73b1d1e5e17d8df9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9042b22d5411fd6cb2ae2ec2b5218aba470e15e71574610dcb7afaa3f0444923
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: ED513A71608300AFD710EF25C986A6FBBE8FF89754F40895DF59997291EB30E904CB92
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _free
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 269201875-0
                                                                                                                                                                                                                                                                              • Opcode ID: f528fe144bdf1cb1a1a58b50fe3542afea31f3f0935b7fecfbad6045357dabb7
                                                                                                                                                                                                                                                                              • Instruction ID: 04c5976f0bb0f69b9dbcad0532d2a95328826466516b5b2f7c736a74da69511f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f528fe144bdf1cb1a1a58b50fe3542afea31f3f0935b7fecfbad6045357dabb7
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 61413BF5A00600BBDB256FFD9D46BEE3AB8EF41370F14422BF41BD6392E67488415261
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00B262E2
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00B26315
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00B26382
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3880355969-0
                                                                                                                                                                                                                                                                              • Opcode ID: 6cf5df8d3837551bf0bcf0d36fffda07e8fd668203fea10edc476b9090d1c6b2
                                                                                                                                                                                                                                                                              • Instruction ID: abd77a5c7b4296a6856aeb5521fa2fcd0bf9423413af9ac8e4020be596e090c5
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6cf5df8d3837551bf0bcf0d36fffda07e8fd668203fea10edc476b9090d1c6b2
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2E511B74A00219EFDF24DF68E881AAE7BF5FF45360F108599F8199B2A0D730AD41CB90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00B11AFD
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B11B0B
                                                                                                                                                                                                                                                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00B11B8A
                                                                                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00B11B94
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorLast$socket
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1881357543-0
                                                                                                                                                                                                                                                                              • Opcode ID: 7ed2d866cec26712d495e4f826570ad88b7309c82f5c10c0bd664c08ff184733
                                                                                                                                                                                                                                                                              • Instruction ID: 676d9e3c0f6a4b787b751a26e4ec172c82b823f14fdbdbecedd4255dc4f4b78f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7ed2d866cec26712d495e4f826570ad88b7309c82f5c10c0bd664c08ff184733
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AE4182356002006FDB20AF24C986F6A77E5EB45718F548498F61A9F2D2D772ED828B91
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: ce65bb54189acd4ba8ae687cb314e62d7ca0d8108308237b7c1cf58f4d5cfa51
                                                                                                                                                                                                                                                                              • Instruction ID: 00d9b9cfd82c74d2052f598805eafaffa1fa95378394f98956aea0d576cbc309
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ce65bb54189acd4ba8ae687cb314e62d7ca0d8108308237b7c1cf58f4d5cfa51
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F2412B75A14304BFD7289F78CD42FAABBF9EB84710F11852EF152DB282D772990187A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00B05783
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00B057A9
                                                                                                                                                                                                                                                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00B057CE
                                                                                                                                                                                                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00B057FA
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3321077145-0
                                                                                                                                                                                                                                                                              • Opcode ID: 37625241ee33bf974798f023c75b5a7295cf07f81d9282920a17fea918d9eca4
                                                                                                                                                                                                                                                                              • Instruction ID: 0c434f06ccff391ffd9b8001af32338f6f3d4c22da00bcfb9cbb13f291bbdf7d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 37625241ee33bf974798f023c75b5a7295cf07f81d9282920a17fea918d9eca4
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E041F935614A10DFCF21DF15C584A5EBBE6EF89720B198488E84AAB362CB34FD41CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00AB6D71,00000000,00000000,00AB82D9,?,00AB82D9,?,00000001,00AB6D71,8BE85006,00000001,00AB82D9,00AB82D9), ref: 00ACD910
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00ACD999
                                                                                                                                                                                                                                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00ACD9AB
                                                                                                                                                                                                                                                                              • __freea.LIBCMT ref: 00ACD9B4
                                                                                                                                                                                                                                                                                • Part of subcall function 00AC3820: RtlAllocateHeap.NTDLL(00000000,?,00B61444,?,00AAFDF5,?,?,00A9A976,00000010,00B61440,00A913FC,?,00A913C6,?,00A91129), ref: 00AC3852
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2652629310-0
                                                                                                                                                                                                                                                                              • Opcode ID: 65e6b689156fd347856ac72ccc913b2573f344d9550c2b2fb908515d8daed291
                                                                                                                                                                                                                                                                              • Instruction ID: c35cd24b2c012ebb8828ca10acb7ba5ffe8b2330cb4faebbc11ff1a363cadcb0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 65e6b689156fd347856ac72ccc913b2573f344d9550c2b2fb908515d8daed291
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7A31BC72A0020AABDF24DF64DC81FAE7BA5EB41310B06466CFC04D7291EB35CD51CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00B25352
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B25375
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B25382
                                                                                                                                                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B253A8
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3340791633-0
                                                                                                                                                                                                                                                                              • Opcode ID: 394020d477aeebb8a033827507198cd1cce05e4bf7ac28e35c84601846a6e306
                                                                                                                                                                                                                                                                              • Instruction ID: 07ac3bbd818f915772386de0bf33244bd6ce0cf3f702d6455337d2caeb0eaee7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 394020d477aeebb8a033827507198cd1cce05e4bf7ac28e35c84601846a6e306
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DD31E530A55A2CEFEB30DE14EC46BE837E5EB05390F586181FA1A971E0C7B49D409B49
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00AFABF1
                                                                                                                                                                                                                                                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00AFAC0D
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00AFAC74
                                                                                                                                                                                                                                                                              • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00AFACC6
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 432972143-0
                                                                                                                                                                                                                                                                              • Opcode ID: dabb88fd78ce449511e207e2d9c16153b41352b889ef43663bc70bdaa13f7696
                                                                                                                                                                                                                                                                              • Instruction ID: 7e2d31862a2ae8450845749168691bd9f08ff944becff967d627267480d4a327
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dabb88fd78ce449511e207e2d9c16153b41352b889ef43663bc70bdaa13f7696
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6831F6B0A0071C6FEB358BE58C157FE7BB5AB69310F04421AF689531D1C37589868752
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • ClientToScreen.USER32(?,?), ref: 00B2769A
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00B27710
                                                                                                                                                                                                                                                                              • PtInRect.USER32(?,?,00B28B89), ref: 00B27720
                                                                                                                                                                                                                                                                              • MessageBeep.USER32(00000000), ref: 00B2778C
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1352109105-0
                                                                                                                                                                                                                                                                              • Opcode ID: 229d2f69e40e6da8137ee59cc8ec5a7432efdbdce8095c873e01a2a644451399
                                                                                                                                                                                                                                                                              • Instruction ID: c9535bc39a19df9d761c7daa535f7155947449071a339c9d1bdd68cdb593b2e4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 229d2f69e40e6da8137ee59cc8ec5a7432efdbdce8095c873e01a2a644451399
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1A418B346452259FCB12CF58E894EA97BF4FB48304F1845E8E8289B2A1CB70AD42CF94
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetForegroundWindow.USER32 ref: 00B216EB
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00AF3A57
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: GetCurrentThreadId.KERNEL32 ref: 00AF3A5E
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00AF25B3), ref: 00AF3A65
                                                                                                                                                                                                                                                                              • GetCaretPos.USER32(?), ref: 00B216FF
                                                                                                                                                                                                                                                                              • ClientToScreen.USER32(00000000,?), ref: 00B2174C
                                                                                                                                                                                                                                                                              • GetForegroundWindow.USER32 ref: 00B21752
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2759813231-0
                                                                                                                                                                                                                                                                              • Opcode ID: b85db9f5c3570d335c2a1cc7b2c7b2cd500d80fe9dde24d2cb170ac9fd980a20
                                                                                                                                                                                                                                                                              • Instruction ID: 9c0082c3c2f3eb22f984573aecab6598313c6de6c3ce289cc4a9a8bcdd40cbc1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b85db9f5c3570d335c2a1cc7b2c7b2cd500d80fe9dde24d2cb170ac9fd980a20
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4C315475E00249AFCB10EFA9C981CAEBBF9EF58304B5044A9E415E7211E731DE45CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A97620: _wcslen.LIBCMT ref: 00A97625
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFDFCB
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFDFE2
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AFE00D
                                                                                                                                                                                                                                                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00AFE018
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3763101759-0
                                                                                                                                                                                                                                                                              • Opcode ID: bccbd19aa0d97a9a0142a4a7a943056c8ffbe94dca00c0bffb0577bf237695ab
                                                                                                                                                                                                                                                                              • Instruction ID: ad0e058c15c6af08b284a27e80d53edc85d0589d989afc6f51ca3023fb1da843
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bccbd19aa0d97a9a0142a4a7a943056c8ffbe94dca00c0bffb0577bf237695ab
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9C219F71940218AFCB21DFA8DA82BBEB7F8EF45750F144065F905BB292D6709E41CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00B29001
                                                                                                                                                                                                                                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00AE7711,?,?,?,?,?), ref: 00B29016
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00B2905E
                                                                                                                                                                                                                                                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00AE7711,?,?,?), ref: 00B29094
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2864067406-0
                                                                                                                                                                                                                                                                              • Opcode ID: 362736dcb8dd56cf3c953043b0ad4939d7af4ade565e3584dd32121b1a75069a
                                                                                                                                                                                                                                                                              • Instruction ID: f110f7613327f42b1396cecfab1c00e9063efc604b4d55e6535aec2760b2b6f3
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 362736dcb8dd56cf3c953043b0ad4939d7af4ade565e3584dd32121b1a75069a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1221BF31600028EFCB258F98D899EFB3BF9FF89350F044595F909872A1C7359951DB60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(?,00B2CB68), ref: 00AFD2FB
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00AFD30A
                                                                                                                                                                                                                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00AFD319
                                                                                                                                                                                                                                                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00B2CB68), ref: 00AFD376
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2267087916-0
                                                                                                                                                                                                                                                                              • Opcode ID: 33d6f7f12bad569f7afa8bc8c09ed50e60ded3c2c982bfade6a436f9ac9850e8
                                                                                                                                                                                                                                                                              • Instruction ID: 65c9812cd3a2b681e44f7e2ff87494265c2fe7ff94dce8f5e54ebfbc82fb9ab6
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 33d6f7f12bad569f7afa8bc8c09ed50e60ded3c2c982bfade6a436f9ac9850e8
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8321D1715082059F8710DFA8C98187F7BE5EE5A324F104B1DF6A9CB2A1DB30D906CB93
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00AF102A
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00AF1036
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF1045
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF104C
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF1062
                                                                                                                                                                                                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00AF15BE
                                                                                                                                                                                                                                                                              • _memcmp.LIBVCRUNTIME ref: 00AF15E1
                                                                                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AF1617
                                                                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00AF161E
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1592001646-0
                                                                                                                                                                                                                                                                              • Opcode ID: 4e36430eaf24415dfb09e051e1bee98f08b249154f8f44550e9a1b354580fb76
                                                                                                                                                                                                                                                                              • Instruction ID: e10ac0da9a7d52542d9d4688d2c35675d0cd3b66b55798aee2a725736e3412dd
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4e36430eaf24415dfb09e051e1bee98f08b249154f8f44550e9a1b354580fb76
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1E215531E00108EBDB10DFA4C945BEEB7B8EF44345F184459E541AB241EB35AA05CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00B2280A
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B22824
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B22832
                                                                                                                                                                                                                                                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00B22840
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2169480361-0
                                                                                                                                                                                                                                                                              • Opcode ID: 542976961eabc8bd025b420d638bf7f4c32e2a633212ee27ba4589331b538b72
                                                                                                                                                                                                                                                                              • Instruction ID: 25cfcb9b18b2fc1ff2ae46cacea843732cedadb8ccb46cf59cce124b122dc31b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 542976961eabc8bd025b420d638bf7f4c32e2a633212ee27ba4589331b538b72
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B2219031209521BFDB149B24E845FAA7BD5EF45324F148298F42ACB6A2CB75EC42CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00AF790A,?,000000FF,?,00AF8754,00000000,?,0000001C,?,?), ref: 00AF8D8C
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF8D7D: lstrcpyW.KERNEL32(00000000,?,?,00AF790A,?,000000FF,?,00AF8754,00000000,?,0000001C,?,?,00000000), ref: 00AF8DB2
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF8D7D: lstrcmpiW.KERNEL32(00000000,?,00AF790A,?,000000FF,?,00AF8754,00000000,?,0000001C,?,?), ref: 00AF8DE3
                                                                                                                                                                                                                                                                              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00AF8754,00000000,?,0000001C,?,?,00000000), ref: 00AF7923
                                                                                                                                                                                                                                                                              • lstrcpyW.KERNEL32(00000000,?,?,00AF8754,00000000,?,0000001C,?,?,00000000), ref: 00AF7949
                                                                                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00AF8754,00000000,?,0000001C,?,?,00000000), ref: 00AF7984
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                                                              • String ID: cdecl
                                                                                                                                                                                                                                                                              • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                                                              • Opcode ID: 4dd77b7556dd9dbe608137fcf31a0db338be96989944fa50d0fc224dda33f4e1
                                                                                                                                                                                                                                                                              • Instruction ID: fbfa1eb640a7fcdb0245274810818b5cbe9820f4e4f2129f0337e3d259d3ab96
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4dd77b7556dd9dbe608137fcf31a0db338be96989944fa50d0fc224dda33f4e1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BE11033A200206AFDB259F74CC85E7E77A9FF85790B40402AFA02C72A4EF719811C7A1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00B27D0B
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00B27D2A
                                                                                                                                                                                                                                                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B27D42
                                                                                                                                                                                                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00B0B7AD,00000000), ref: 00B27D6B
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$Long
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 847901565-0
                                                                                                                                                                                                                                                                              • Opcode ID: e8d7bc5a166d8bf859c1c18650a0afd3127065af4a9de9ff97017871babe6f10
                                                                                                                                                                                                                                                                              • Instruction ID: 34f81098c85237173e89605dad0871d14edda8d8a0d22860504d5fb4871bf85a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e8d7bc5a166d8bf859c1c18650a0afd3127065af4a9de9ff97017871babe6f10
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6611D271144625AFCB108F28DC04AAA3BE5EF453A0B154774F839C72F0DB349912CB50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001060,?,00000004), ref: 00B256BB
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B256CD
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B256D8
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B25816
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 455545452-0
                                                                                                                                                                                                                                                                              • Opcode ID: 25b94e460b94fc35c8bbf0e4fea9ecffd630c898f960732bf82e556300ce34b9
                                                                                                                                                                                                                                                                              • Instruction ID: 97a2bd2f5fb6aa87919136dda5a26362d8d91c4441fafbdb24ff88f21fd5def4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 25b94e460b94fc35c8bbf0e4fea9ecffd630c898f960732bf82e556300ce34b9
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9A11D37160062896DB309F65ECC5AEE77ECEF10760B5041A6F929D6182EB70DA80CB60
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                                                                              • Opcode ID: 2bcefe228512ccecc9ce5b0e467e74847b148a9a6100d94501aee5691f25cc88
                                                                                                                                                                                                                                                                              • Instruction ID: ced75534191856438df48b15bfee79d4158f23b030dc82e48dbe96e9997deecf
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2bcefe228512ccecc9ce5b0e467e74847b148a9a6100d94501aee5691f25cc88
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F40162B2309A167EF62226787CC1F67666DDF823B8B36032DF522611D7DF708C5051A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00AF1A47
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AF1A59
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AF1A6F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AF1A8A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3850602802-0
                                                                                                                                                                                                                                                                              • Opcode ID: ad9767a46da967e06665e77b5d7f24131446a5e1eb57a32b14d52a4ff501f17c
                                                                                                                                                                                                                                                                              • Instruction ID: d6faecf7d3142a8eb961dfae1e4cfab9a77ebdabbb61b94faf20cbaa21f5c10a
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ad9767a46da967e06665e77b5d7f24131446a5e1eb57a32b14d52a4ff501f17c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D111093AD01219FFEB11EBE5CD85FADBB78EB08790F200091EA04B7290D6716E51DB94
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00AFE1FD
                                                                                                                                                                                                                                                                              • MessageBoxW.USER32(?,?,?,?), ref: 00AFE230
                                                                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00AFE246
                                                                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00AFE24D
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2880819207-0
                                                                                                                                                                                                                                                                              • Opcode ID: 38350c48482ec3a657c95322c64e4f4529d233180964b8943d057557074f398d
                                                                                                                                                                                                                                                                              • Instruction ID: 08b075715edd1d2b508b7f985c24bdca5691ecc857b1d79e67f0d97479a869e1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 38350c48482ec3a657c95322c64e4f4529d233180964b8943d057557074f398d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3D110872904258BBDB11DFEC9C05AEE7FACEB45320F144A15FA15E33A1EAB48D0087A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateThread.KERNEL32(00000000,?,00ABCFF9,00000000,00000004,00000000), ref: 00ABD218
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00ABD224
                                                                                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00ABD22B
                                                                                                                                                                                                                                                                              • ResumeThread.KERNEL32(00000000), ref: 00ABD249
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 173952441-0
                                                                                                                                                                                                                                                                              • Opcode ID: 865809c73bdbe23b3f1b167a1b5ad650e2b4f83741dbf3fd540f47f1060ea30f
                                                                                                                                                                                                                                                                              • Instruction ID: bf53444ad60dea3ea592532b8491c6a569550ac656c7a59862b876b06bcae3f0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 865809c73bdbe23b3f1b167a1b5ad650e2b4f83741dbf3fd540f47f1060ea30f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5601D236805204BFDB21ABA5DC0ABEE7E6DEF81331F200219F925921D2EF718901C7A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AA9BB2
                                                                                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00B29F31
                                                                                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00B29F3B
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00B29F46
                                                                                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00B29F7A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4127811313-0
                                                                                                                                                                                                                                                                              • Opcode ID: 944b5f477312ed2ecb8c696d601d190911b816b6007dd637bed1ba827cc332c8
                                                                                                                                                                                                                                                                              • Instruction ID: ccb4c4e4398cfe7f4f1615005a45795e0c543197a9a73cb8ef5dcc7ac56b9050
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 944b5f477312ed2ecb8c696d601d190911b816b6007dd637bed1ba827cc332c8
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 62115A3290012AABDB50DF68E9869EE7BB8FF05311F000491F919E3150D734BA82CBA1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00A9604C
                                                                                                                                                                                                                                                                              • GetStockObject.GDI32(00000011), ref: 00A96060
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A9606A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3970641297-0
                                                                                                                                                                                                                                                                              • Opcode ID: 38291368e4e39047e00e1b1bb2a509cb7c2d69c7115d96ebeed8ec11fb85477a
                                                                                                                                                                                                                                                                              • Instruction ID: 80fcd8ca0c3b03ae6d56661a543e7a4449295ec909464739a621ec22e972e274
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 38291368e4e39047e00e1b1bb2a509cb7c2d69c7115d96ebeed8ec11fb85477a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CD116172601508BFEF224F949C94EEA7FA9EF18395F044115FA1553160DB329C61DB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00AB3B56
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00AB3AD2
                                                                                                                                                                                                                                                                                • Part of subcall function 00AB3AA3: ___AdjustPointer.LIBCMT ref: 00AB3AED
                                                                                                                                                                                                                                                                              • _UnwindNestedFrames.LIBCMT ref: 00AB3B6B
                                                                                                                                                                                                                                                                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00AB3B7C
                                                                                                                                                                                                                                                                              • CallCatchBlock.LIBVCRUNTIME ref: 00AB3BA4
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 737400349-0
                                                                                                                                                                                                                                                                              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                                              • Instruction ID: 344fa6cf30400129cc77bbbcc73038b30934d8c13caab9b13ec671a04664163f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F701D732100149BBDF126F95CD46EEB7B6DFF58754F054018FE4856122D632E961ABA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00A913C6,00000000,00000000,?,00AC301A,00A913C6,00000000,00000000,00000000,?,00AC328B,00000006,FlsSetValue), ref: 00AC30A5
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00AC301A,00A913C6,00000000,00000000,00000000,?,00AC328B,00000006,FlsSetValue,00B32290,FlsSetValue,00000000,00000364,?,00AC2E46), ref: 00AC30B1
                                                                                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00AC301A,00A913C6,00000000,00000000,00000000,?,00AC328B,00000006,FlsSetValue,00B32290,FlsSetValue,00000000), ref: 00AC30BF
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3177248105-0
                                                                                                                                                                                                                                                                              • Opcode ID: 1f2743a1ac0eb562b2a7d5d74a2fe1399bec2125f746109ae36ff9a676817881
                                                                                                                                                                                                                                                                              • Instruction ID: d3c805c13b7872e742a6fc58890b9936481990e8a9d830f66dfc8c2814af996b
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1f2743a1ac0eb562b2a7d5d74a2fe1399bec2125f746109ae36ff9a676817881
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3901FC33301622ABCF314B79AC44F6B7B98AF05761B228628F916E7140CF21D901CAD0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00AF747F
                                                                                                                                                                                                                                                                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00AF7497
                                                                                                                                                                                                                                                                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00AF74AC
                                                                                                                                                                                                                                                                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00AF74CA
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1352324309-0
                                                                                                                                                                                                                                                                              • Opcode ID: 205a85884d5a7a75a87e162291562bcea83b679f69abd38a5887dd17a6ba0b9f
                                                                                                                                                                                                                                                                              • Instruction ID: ef0d84f552277c79710610f5ec3a5f04870390ff5d80a41b16961d021f29897f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 205a85884d5a7a75a87e162291562bcea83b679f69abd38a5887dd17a6ba0b9f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 96118EB12053199BE7309F98EC09BAABFFCEB00B01F108569B626D7191DB70E904DB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00AFACD3,?,00008000), ref: 00AFB0C4
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00AFACD3,?,00008000), ref: 00AFB0E9
                                                                                                                                                                                                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00AFACD3,?,00008000), ref: 00AFB0F3
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00AFACD3,?,00008000), ref: 00AFB126
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2875609808-0
                                                                                                                                                                                                                                                                              • Opcode ID: efc95e8e71f888ff75fadaa9eb09f7b3995303abbefba8d249323e54e1ac2ffb
                                                                                                                                                                                                                                                                              • Instruction ID: 2d52b009878cd46af8370a0b3e4aded90ee5527e8e0ace7c681447619215687c
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: efc95e8e71f888ff75fadaa9eb09f7b3995303abbefba8d249323e54e1ac2ffb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B8112731C11A2CE7CF10AFE5E9696FEBF78BB09711F104185EA41B3185CF3056518B65
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00B27E33
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00B27E4B
                                                                                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00B27E6F
                                                                                                                                                                                                                                                                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B27E8A
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 357397906-0
                                                                                                                                                                                                                                                                              • Opcode ID: 59a3d8d136af7dee41cd3e432b448f5e1f19f4f73d7a763418f79fe04b6b6f4f
                                                                                                                                                                                                                                                                              • Instruction ID: 395adc81e4d4796fb9f5feac2b5929a6834ee385a4468b86f544bbe99c80f378
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 59a3d8d136af7dee41cd3e432b448f5e1f19f4f73d7a763418f79fe04b6b6f4f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 201113B9D0024AAFDB51DF98D8849EEBBF9FF08310F505056E915E3210D735AA55CF90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00AF2DC5
                                                                                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00AF2DD6
                                                                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00AF2DDD
                                                                                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00AF2DE4
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2710830443-0
                                                                                                                                                                                                                                                                              • Opcode ID: dea8ce92c3f40cf4aa624f960e03483be4ed1ae9148021d6a251541dac1e4faf
                                                                                                                                                                                                                                                                              • Instruction ID: cd1098430076aa6d879f9bb9880a1c2cb7391973a9ddbfb4cb9e5070f3c1f393
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dea8ce92c3f40cf4aa624f960e03483be4ed1ae9148021d6a251541dac1e4faf
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6CE06D711016287BE7301BA29C0EFFB7E6CEB46BA1F500115B205D30809AA88842C6B0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AA9693
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9639: SelectObject.GDI32(?,00000000), ref: 00AA96A2
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9639: BeginPath.GDI32(?), ref: 00AA96B9
                                                                                                                                                                                                                                                                                • Part of subcall function 00AA9639: SelectObject.GDI32(?,00000000), ref: 00AA96E2
                                                                                                                                                                                                                                                                              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00B28887
                                                                                                                                                                                                                                                                              • LineTo.GDI32(?,?,?), ref: 00B28894
                                                                                                                                                                                                                                                                              • EndPath.GDI32(?), ref: 00B288A4
                                                                                                                                                                                                                                                                              • StrokePath.GDI32(?), ref: 00B288B2
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1539411459-0
                                                                                                                                                                                                                                                                              • Opcode ID: a8caabe62b4bc1863d562b14add2a0b74f12def44fb32978e4f5ecc0a8367653
                                                                                                                                                                                                                                                                              • Instruction ID: ac67358f97497b0ac2742531ff60850f0c8b9bbba3efcc909645d882e0c59e85
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a8caabe62b4bc1863d562b14add2a0b74f12def44fb32978e4f5ecc0a8367653
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E9F05E36042668FAEB225F94AC0AFCF3F59AF06311F048140FA11660E2CBB95522CFE5
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(00000008), ref: 00AA98CC
                                                                                                                                                                                                                                                                              • SetTextColor.GDI32(?,?), ref: 00AA98D6
                                                                                                                                                                                                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00AA98E9
                                                                                                                                                                                                                                                                              • GetStockObject.GDI32(00000005), ref: 00AA98F1
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 4037423528-0
                                                                                                                                                                                                                                                                              • Opcode ID: 8d06ebdac6a3067d1db6d4727abee8ce477c631df30e0c38bdb285d6783a7566
                                                                                                                                                                                                                                                                              • Instruction ID: fe3551f811f2e2a25ef8a45784d631ee6a755d3dc306918be7ea7a3f2e7630d9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8d06ebdac6a3067d1db6d4727abee8ce477c631df30e0c38bdb285d6783a7566
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4BE06D31244680AADB315B75AC0ABED3F20AB12336F048219F6FA6A0E1CBB146519B21
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetCurrentThread.KERNEL32 ref: 00AF1634
                                                                                                                                                                                                                                                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00AF11D9), ref: 00AF163B
                                                                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00AF11D9), ref: 00AF1648
                                                                                                                                                                                                                                                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00AF11D9), ref: 00AF164F
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 3974789173-0
                                                                                                                                                                                                                                                                              • Opcode ID: 3ca8473dd07b4a0bdf14426acb5fde31d734abed468fd8353e9bc4bfe0073a90
                                                                                                                                                                                                                                                                              • Instruction ID: 99b164d0bd3f0d36daed4a8bfccd42f1e249ceff0d1fb2ec94563976e56b92b7
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3ca8473dd07b4a0bdf14426acb5fde31d734abed468fd8353e9bc4bfe0073a90
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5EE04632602211EBD7701BE0AE0DB9B3F68AF48796F148808F245CB080EA3484428BA9
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00AED858
                                                                                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00AED862
                                                                                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00AED882
                                                                                                                                                                                                                                                                              • ReleaseDC.USER32(?), ref: 00AED8A3
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2889604237-0
                                                                                                                                                                                                                                                                              • Opcode ID: d7d7fa114cab2a116fe17fb8d5c5f2fdc5aad35b305948e8aa87cb0d17a506bf
                                                                                                                                                                                                                                                                              • Instruction ID: 8a0cf938fb0525b5d6319582e35e1c54562443782c570381f49f20827c5de1d9
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d7d7fa114cab2a116fe17fb8d5c5f2fdc5aad35b305948e8aa87cb0d17a506bf
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 03E09AB5900205DFCF529FA1D90866DBFB5FB08711F148459F846E7250DB385942EF51
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00AED86C
                                                                                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00AED876
                                                                                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00AED882
                                                                                                                                                                                                                                                                              • ReleaseDC.USER32(?), ref: 00AED8A3
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 2889604237-0
                                                                                                                                                                                                                                                                              • Opcode ID: f0113691f89bda16d14e3cfd9ddc8911ee5b29efe364b0855a782ae4ea348bf6
                                                                                                                                                                                                                                                                              • Instruction ID: 90432637c815c5a6392bc6f8089c69c232ca7869176e6667a320392209f56e31
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f0113691f89bda16d14e3cfd9ddc8911ee5b29efe364b0855a782ae4ea348bf6
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4CE092B5D00204EFCF62AFA0D90866EBFB5FB08711B148449F94AE7250DB385902EF91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A97620: _wcslen.LIBCMT ref: 00A97625
                                                                                                                                                                                                                                                                              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00B04ED4
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Connection_wcslen
                                                                                                                                                                                                                                                                              • String ID: *$LPT
                                                                                                                                                                                                                                                                              • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                                                              • Opcode ID: 55bc3facb1ef3992ec0640b14074c2faa1b986c9548fab56fe59f3d7b98a16bb
                                                                                                                                                                                                                                                                              • Instruction ID: 52dbe5b28e2aa82e7d9efefb9f936576f2d6c33255649a122d37be58a3008947
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 55bc3facb1ef3992ec0640b14074c2faa1b986c9548fab56fe59f3d7b98a16bb
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8C915CB5A042059FCB14DF58C584EAABBF1EF48304F1980D9E90A9F3A2D735ED85CB91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • __startOneArgErrorHandling.LIBCMT ref: 00ABE30D
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ErrorHandling__start
                                                                                                                                                                                                                                                                              • String ID: pow
                                                                                                                                                                                                                                                                              • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                                                              • Opcode ID: c3ec87b7f2b8c7c817d507e625da2482eb05439db8b4cbe4174e6042fdefb9f3
                                                                                                                                                                                                                                                                              • Instruction ID: 07392fab5063eb3e3638bd1769361e66a88287199b50591808bbddf210d7bf31
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c3ec87b7f2b8c7c817d507e625da2482eb05439db8b4cbe4174e6042fdefb9f3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9D512B71A0C20296CB16F718CA41BFD3BECAB50741F35895CE096872EADF358C959E86
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                                                                              • String ID: #
                                                                                                                                                                                                                                                                              • API String ID: 0-1885708031
                                                                                                                                                                                                                                                                              • Opcode ID: e131d535ad2df63f39d6e3df90ffa66a463c7421e02cf487c88033ce409f473a
                                                                                                                                                                                                                                                                              • Instruction ID: 124d516c5e39a9f6ab03eba1394b65eeae2d72aa63e3cd20037d33a31c0a731d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e131d535ad2df63f39d6e3df90ffa66a463c7421e02cf487c88033ce409f473a
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 77513375A00286DFDF25DF29C481AFA7BB8EF66310F244059EC919B2D0DB309D46CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • Sleep.KERNEL32(00000000), ref: 00AAF2A2
                                                                                                                                                                                                                                                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00AAF2BB
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                                                              • String ID: @
                                                                                                                                                                                                                                                                              • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                                                              • Opcode ID: d0180946ea6728b5e5a87be19028a74ecb5ecdcdb746ba40014f5ebd607c266c
                                                                                                                                                                                                                                                                              • Instruction ID: fbed4a461b52ea57dbbd6507c574614aae6950786b787e888633351a46687a5f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d0180946ea6728b5e5a87be19028a74ecb5ecdcdb746ba40014f5ebd607c266c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A55167725187449BD720AF14D886BAFBBF8FF85310F81884CF29942195EB708569CB66
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00B157E0
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B157EC
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                                                              • String ID: CALLARGARRAY
                                                                                                                                                                                                                                                                              • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                                                              • Opcode ID: ed933bcd3cb524dcdfc37f3e8388953a4d56461c98f8179159d0db7f89f4e0f3
                                                                                                                                                                                                                                                                              • Instruction ID: 2ac104ae6a092baa17502241e97bd32b3f9a4198b0e7b64e4038fce16aec68b1
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ed933bcd3cb524dcdfc37f3e8388953a4d56461c98f8179159d0db7f89f4e0f3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CD418031A00209DFCB24DFA9C9819FEBBF5FF99314F5040A9E515A7291EB309D81CBA0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00B0D130
                                                                                                                                                                                                                                                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00B0D13A
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                                                              • String ID: |
                                                                                                                                                                                                                                                                              • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                                                              • Opcode ID: fc24135b99890c183c77cf35ab049087d522176dacdf080a806668093e9d85a6
                                                                                                                                                                                                                                                                              • Instruction ID: e1e62584068f65b1d7bc62a1de0d5496ef7bdfae60257198fff0feb058b4079d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fc24135b99890c183c77cf35ab049087d522176dacdf080a806668093e9d85a6
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 78312C71D00209ABCF15EFA5CD85AEE7FB9FF04340F000059F815A61A2DB31AA06CB50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • DestroyWindow.USER32(?,?,?,?), ref: 00B23621
                                                                                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B2365C
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$DestroyMove
                                                                                                                                                                                                                                                                              • String ID: static
                                                                                                                                                                                                                                                                              • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                                                              • Opcode ID: c998890001fa6597fc37843ca5805710956e95dfa819503be63d22002d6f95d5
                                                                                                                                                                                                                                                                              • Instruction ID: 9967133a0b2fdf778594006f487a92af354f63eed94cb9ed148f01fa16a9e969
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c998890001fa6597fc37843ca5805710956e95dfa819503be63d22002d6f95d5
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F2318F71110614AADB219F28EC80EFB77E9FF58B20F108619F8A997290DB35AD91D760
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00B2461F
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B24634
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                                                                                              • String ID: '
                                                                                                                                                                                                                                                                              • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                                                              • Opcode ID: 104fd82f57a273fa2ffbd9e36827064b3ebc1db9411c478295234888a5f2186d
                                                                                                                                                                                                                                                                              • Instruction ID: 26cbfbb61ce94bcfea3bb5ee795a443f5adc212ea51544e7c1928ce1dabee4e2
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 104fd82f57a273fa2ffbd9e36827064b3ebc1db9411c478295234888a5f2186d
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7E313874A002199FDF14CFA9D980BDA7BF5FF19300F1444AAE908AB781D770A941CF90
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B2327C
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B23287
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                                                                                              • String ID: Combobox
                                                                                                                                                                                                                                                                              • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                                                              • Opcode ID: 35579adad9662158e299447d9bb5ed248c11ea02f8c66153538d5b5ce434a579
                                                                                                                                                                                                                                                                              • Instruction ID: 57e02edc0de9127e3a07caa6a04c47eb4f60311c944fb40a6a6e7b94b018cf0d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 35579adad9662158e299447d9bb5ed248c11ea02f8c66153538d5b5ce434a579
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AE11E271300218BFEF219E54EC80EBB3BEAEB98764F104164F918A7290D6359D518B60
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A9600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00A9604C
                                                                                                                                                                                                                                                                                • Part of subcall function 00A9600E: GetStockObject.GDI32(00000011), ref: 00A96060
                                                                                                                                                                                                                                                                                • Part of subcall function 00A9600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A9606A
                                                                                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00B2377A
                                                                                                                                                                                                                                                                              • GetSysColor.USER32(00000012), ref: 00B23794
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                                                              • String ID: static
                                                                                                                                                                                                                                                                              • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                                                              • Opcode ID: 1a7bbc7c84fafd12aa94b73f502cd90918fbcdd5a092dfdce97bce9328496ac6
                                                                                                                                                                                                                                                                              • Instruction ID: 6b62bd0263bed5a9aab7ae8678637156defb4409e60cba0e5ad492d23eeb622f
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1a7bbc7c84fafd12aa94b73f502cd90918fbcdd5a092dfdce97bce9328496ac6
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F81147B2610219AFDF00DFA8DC46EEA7BF8FB08304F004914F959E3250DB78E8119B50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B0CD7D
                                                                                                                                                                                                                                                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B0CDA6
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Internet$OpenOption
                                                                                                                                                                                                                                                                              • String ID: <local>
                                                                                                                                                                                                                                                                              • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                                                              • Opcode ID: 811fc71c92965fa4aa7a207969d96d8ede8074f3d929248b419a506ba3c6d994
                                                                                                                                                                                                                                                                              • Instruction ID: 1b25e1e014c4b7262c7a06a858e64bd47aad111893a546ad14cb95e67d7ef98d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 811fc71c92965fa4aa7a207969d96d8ede8074f3d929248b419a506ba3c6d994
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1011A071215631BAD7384B668C89EE7BEE8EF127A4F1043BAB119830D0E7609845D6F0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetWindowTextLengthW.USER32(00000000), ref: 00B234AB
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B234BA
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                                                                              • String ID: edit
                                                                                                                                                                                                                                                                              • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                                                                              • Opcode ID: 30ba4dc0739bc6c4f98e1e8220bace242a55202b3ae396c529991cadfb7b1f9f
                                                                                                                                                                                                                                                                              • Instruction ID: 0ce5b1429296352e757666144325987711c84187b88d6965afd9c2a3632b1e90
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 30ba4dc0739bc6c4f98e1e8220bace242a55202b3ae396c529991cadfb7b1f9f
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8C11B271100118ABEB125E64EC80AEB3BE9EF04B74F504394F979932D0C779DC919B50
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?,?), ref: 00AF6CB6
                                                                                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00AF6CC2
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                              • String ID: STOP
                                                                                                                                                                                                                                                                              • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                                                              • Opcode ID: 3da0f13f63556e71c46c7c38eb5cfe8c1508888b9dbec2df2fbd0a6b0edb2d52
                                                                                                                                                                                                                                                                              • Instruction ID: 5ab5fef6eeb05582de0eee2ae3061ee2fb98c3c93fbe14dfd5af785e26cfeb97
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3da0f13f63556e71c46c7c38eb5cfe8c1508888b9dbec2df2fbd0a6b0edb2d52
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 72012232A0092A9BCB20AFFDDC809BF77F8EB657107000928FAA297195EB31D801C650
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00AF3CCA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00AF1D4C
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                              • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                              • Opcode ID: b26a46d5024d25a432e1b27f52198cabb15bac365aa2cad915fffd23c910a5af
                                                                                                                                                                                                                                                                              • Instruction ID: 9747eb06e1bdf4955fecde7691fe2a958c954cf581b05c6a954327424ad577a0
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b26a46d5024d25a432e1b27f52198cabb15bac365aa2cad915fffd23c910a5af
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C901B17170121CAB8F18EFE4CE659FF77B8EB46350B04061EB932672D1EA31590D8660
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00AF3CCA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00AF1C46
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                              • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                              • Opcode ID: 78cb38e7a21799eeaf11bb7709ec2f095107e2e02f9259c4208ccbc63d9b308b
                                                                                                                                                                                                                                                                              • Instruction ID: 9b42af20021966a4da4325190a2bd624990eeecc717d3251bc37cc1f648e4419
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 78cb38e7a21799eeaf11bb7709ec2f095107e2e02f9259c4208ccbc63d9b308b
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C701A77578110CBACF14EBD5CE65AFF77E89B11341F14001DBA1677291EA209E0DC6B1
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00AF3CCA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00AF1CC8
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                              • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                              • Opcode ID: 707d67052f07ac9bcfec01d144e94a366328757e58c0765ddea16d523bcf59a1
                                                                                                                                                                                                                                                                              • Instruction ID: cec3e888ab8eadf421e9f977a5b355d5c9b04255a049a205b78d9505c305e362
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 707d67052f07ac9bcfec01d144e94a366328757e58c0765ddea16d523bcf59a1
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C501A271B8011CBACF14EBE5CB11AFF77E89B11340B140419B95277281EA219F1AC672
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00A99CB3: _wcslen.LIBCMT ref: 00A99CBD
                                                                                                                                                                                                                                                                                • Part of subcall function 00AF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00AF3CCA
                                                                                                                                                                                                                                                                              • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00AF1DD3
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                              • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                              • Opcode ID: 5c781cefee886fa225485aa28f67941f986c8aad300d9731fb8d8ed921dc97b3
                                                                                                                                                                                                                                                                              • Instruction ID: 5ce899dc69d6448a407b06d6698e85f656a6155a88dbb9bc1b20b3f09a3e0bdb
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5c781cefee886fa225485aa28f67941f986c8aad300d9731fb8d8ed921dc97b3
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A0F0A471B4121CBADF14EBE9CE66BFF77F8AB01350F040919B922672D1DA70590D8271
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: _wcslen
                                                                                                                                                                                                                                                                              • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                                                                              • API String ID: 176396367-3042988571
                                                                                                                                                                                                                                                                              • Opcode ID: f5824f7abb028c3a80e6abf3d2a45d8480a6ab8e8ef27def0e6a39e0cd18a739
                                                                                                                                                                                                                                                                              • Instruction ID: 36e4ad05b0da4b70a16f9661c6a185b4fe31c35464de88286d570d04a0ba4263
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f5824f7abb028c3a80e6abf3d2a45d8480a6ab8e8ef27def0e6a39e0cd18a739
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0EE02B023542201093311279ADC1AFF56DDCFCD7A0754186BF981C336BEE948DD293A0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00AF0B23
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Message
                                                                                                                                                                                                                                                                              • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                                                              • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                                                              • Opcode ID: ec19e3c7f17b9e733cd889c35b8867c08244dbeecab27c070eaff44937b10809
                                                                                                                                                                                                                                                                              • Instruction ID: 5eae0c4a591bb9af6e6f216aeb0e7c43d4dd386ad7efe1c0a7149325f5cba677
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ec19e3c7f17b9e733cd889c35b8867c08244dbeecab27c070eaff44937b10809
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3CE048322443186AD62537D47D03FDD7EC48F05B55F100466FB58965D38BE1649046EA
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                                • Part of subcall function 00AAF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00AB0D71,?,?,?,00A9100A), ref: 00AAF7CE
                                                                                                                                                                                                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,00A9100A), ref: 00AB0D75
                                                                                                                                                                                                                                                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00A9100A), ref: 00AB0D84
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00AB0D7F
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                                                              • API String ID: 55579361-631824599
                                                                                                                                                                                                                                                                              • Opcode ID: 6a816076af81d2dc57eb8919adffdc33c877cd005296a8f396b792ee74588492
                                                                                                                                                                                                                                                                              • Instruction ID: c4937d8721396a020cab4d52b8d5c65aa2eaa90b1f9bb49f5ad0b874c7940c82
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6a816076af81d2dc57eb8919adffdc33c877cd005296a8f396b792ee74588492
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 80E039702003118BD331AFA8E508B967BE4AB00740F00496DE486C76A2EBB4E4458B91
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00B0302F
                                                                                                                                                                                                                                                                              • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00B03044
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                                                              • String ID: aut
                                                                                                                                                                                                                                                                              • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                                                              • Opcode ID: 76ecfc3d2b1f802e741c576247d050ee41c0a998450c36eb7ca3a32a1fbbcc5c
                                                                                                                                                                                                                                                                              • Instruction ID: 51b024a5f1baf8b1a8e60598a04070843943a2597129f770b912d44a9cf81626
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 76ecfc3d2b1f802e741c576247d050ee41c0a998450c36eb7ca3a32a1fbbcc5c
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B4D05E72500328A7DA70A7A4AC0EFCB3F6CDB04751F4002A1BA55E30A1DEB09985CAD0
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: LocalTime
                                                                                                                                                                                                                                                                              • String ID: %.3d$X64
                                                                                                                                                                                                                                                                              • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                                                              • Opcode ID: b20cfb03450b57e9beac711509e978e774c8982aa849e7221b68d01363ff73af
                                                                                                                                                                                                                                                                              • Instruction ID: 6cadd8ced86c43fd24bea136da45bfc6840b0ed326c90ee53c5218df81a87fb4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b20cfb03450b57e9beac711509e978e774c8982aa849e7221b68d01363ff73af
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4FD012B1808148E9CB5096E1DD459F9B7BCEB09341F508452FA17A2050DB24C5096B61
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B2232C
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B2233F
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFE97B: Sleep.KERNEL32 ref: 00AFE9F3
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                                              • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                              • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                                              • Opcode ID: 610e7dd7c3f42a0d8ca81737a6c783cf05178712a3fb8e2ac918444165e8c421
                                                                                                                                                                                                                                                                              • Instruction ID: 7645b37e47f3f985eeba4959eabcd80b367d533d296252ef8d5de1f053c53287
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 610e7dd7c3f42a0d8ca81737a6c783cf05178712a3fb8e2ac918444165e8c421
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8ED0C936394710B6E674A7709C4FFDAAA55AB14B11F004A567B45AB1E0C9F0A8068A54
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B2236C
                                                                                                                                                                                                                                                                              • PostMessageW.USER32(00000000), ref: 00B22373
                                                                                                                                                                                                                                                                                • Part of subcall function 00AFE97B: Sleep.KERNEL32 ref: 00AFE9F3
                                                                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                                              • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                              • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                                              • Opcode ID: 0ef6c77a3196a43b33b87f4fd54f73a017e8f8afe35fbdd08a3c34922ac04d15
                                                                                                                                                                                                                                                                              • Instruction ID: 8b78d47083132f319299d5750afbce176a61400df625e76a18b5ddec2c85eb2d
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0ef6c77a3196a43b33b87f4fd54f73a017e8f8afe35fbdd08a3c34922ac04d15
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0FD0C932381710BAE675A7709C4FFCAAA55AB14B11F404A567B45AB1E0C9F0A8068A54
                                                                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00ACBE93
                                                                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00ACBEA1
                                                                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00ACBEFC
                                                                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                                                                              • Source File: 00000000.00000002.2094528385.0000000000A91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094503097.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094648511.0000000000B52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094717760.0000000000B5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              • Associated: 00000000.00000002.2094742723.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_a90000_file.jbxd
                                                                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                                                                              • API String ID: 1717984340-0
                                                                                                                                                                                                                                                                              • Opcode ID: 2205a02d659613a2235f3d2433b8733018f1672630c851545eec2c54eb0ad147
                                                                                                                                                                                                                                                                              • Instruction ID: de5e15dd99fc25e9bd2c32ecffdffcb194ec337e98fc226df57c7c9224f73ea4
                                                                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2205a02d659613a2235f3d2433b8733018f1672630c851545eec2c54eb0ad147
                                                                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD41E334610216AFDF21CF64CD46FAA7BA8AF41720F16416DF9599B2A1DB32CC01CBB0