Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1543500
MD5:158a88b989303eb0443db400eea08e23
SHA1:492ee65174fb3e1739c9a117099f80b816575022
SHA256:18d9e19df2cc995fd5e2f0c0b5f74c79b08c7f6d139f49e46f7cb893e3685950
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7292 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 158A88B989303EB0443DB400EEA08E23)
    • taskkill.exe (PID: 7308 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7408 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7472 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7536 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7600 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 7664 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 7696 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 7712 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7956 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4545e727-0c1a-4468-96bf-5b74738a9406} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 2410036fd10 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7572 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3572 -parentBuildID 20230927232528 -prefsHandle 4496 -prefMapHandle 4492 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {11f93443-0807-4a81-8b55-bb39ff0fc5bb} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 24110c63e10 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7212 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5160 -prefMapHandle 5156 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b805f6f-7f96-4d47-a250-29f74ce1fae6} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 24100371b10 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.1749194237.0000000000DAF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    00000000.00000003.1749451115.0000000000DB6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
      Process Memory Space: file.exe PID: 7292JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: file.exeReversingLabs: Detection: 47%
        Source: file.exeVirustotal: Detection: 41%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
        Source: file.exeJoe Sandbox ML: detected
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49764 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49770 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49769 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49772 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49773 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 151.101.1.91:443 -> 192.168.2.4:49775 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49777 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49780 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49779 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49778 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49833 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49831 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49832 version: TLS 1.2
        Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1966125840.000002411B911000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
        Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000D.00000003.1969719121.000002410DA9D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1971594718.000002410DA9D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000D.00000003.1969719121.000002410DA9D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1968246443.000002411B911000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
        Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1966125840.000002411B911000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1971594718.000002410DA9D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1968246443.000002411B911000.00000004.00000020.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0057DBBE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005868EE FindFirstFileW,FindClose,0_2_005868EE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0058698F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0057D076
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0057D3A9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00589642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00589642
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0058979D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00589B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00589B2B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00585C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00585C97
        Source: firefox.exeMemory has grown: Private usage: 37MB later: 204MB
        Source: unknownNetwork traffic detected: DNS query count 31
        Source: Joe Sandbox ViewIP Address: 151.101.1.91 151.101.1.91
        Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
        Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
        Source: Joe Sandbox ViewIP Address: 34.160.144.191 34.160.144.191
        Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0058CE44
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: firefox.exe, 0000000D.00000003.1907161244.000002411A2B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/P equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1794523921.0000024111391000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1779022278.0000024111393000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1920166488.0000024118688000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938172126.000002411868A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1920166488.0000024118688000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938172126.000002411868A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1907161244.000002411A2B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1946177615.00000241137F1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942236238.00000241137EC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1946177615.00000241137F1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942236238.00000241137EC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
        Source: firefox.exe, 0000000D.00000003.1946177615.00000241137F1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942236238.00000241137EC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5B0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 00000014.00000002.3546546206.000001DF5410C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.facebook.com (Facebook)
        Source: firefox.exe, 00000014.00000002.3546546206.000001DF5410C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.twitter.com (Twitter)
        Source: firefox.exe, 00000014.00000002.3546546206.000001DF5410C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1794523921.0000024111391000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1779022278.0000024111393000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1779175781.0000024110BC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1779175781.0000024110BE8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1934949221.0000024119262000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
        Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: youtube.com
        Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
        Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
        Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: example.org
        Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
        Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
        Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
        Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: www.youtube.com
        Source: global trafficDNS traffic detected: DNS query: www.facebook.com
        Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
        Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
        Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
        Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
        Source: global trafficDNS traffic detected: DNS query: www.reddit.com
        Source: global trafficDNS traffic detected: DNS query: twitter.com
        Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
        Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
        Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
        Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
        Source: firefox.exe, 0000000D.00000003.1923209545.00000241140B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1941322146.00000241140B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1777695946.00000241185A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1777473779.00000241186BF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960371594.000002410DA91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960371594.000002410DA91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
        Source: firefox.exe, 0000000D.00000003.1931020318.0000024119ACE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/
        Source: firefox.exe, 0000000D.00000003.1931020318.0000024119ACE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
        Source: firefox.exe, 0000000D.00000003.1932564629.00000241197BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1941058460.00000241140C6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1953118029.00000241140C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
        Source: firefox.exe, 0000000D.00000003.1941953335.0000024113A8E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411845B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.addEventListener
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411845B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-06/schema#
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-07/schema#-
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1872136206.00000241108BF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
        Source: firefox.exe, 0000000D.00000003.1841990900.00000241114DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869262952.00000241114C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118872000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1807626734.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1799479243.0000024111677000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886481116.00000241112C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1801736862.0000024111671000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869262952.00000241114C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898082990.000002411160D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1799479243.000002411163A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879874030.0000024111642000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912391450.00000241114BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947408964.000002411364E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792297176.000002411848D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805007995.00000241114C2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1873949705.00000241116C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898431160.0000024111638000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922645319.00000241184E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792297176.00000241184CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792297176.000002411844C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.00000241114CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0C
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0N
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960371594.000002410DA91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.thawte.com0
        Source: firefox.exe, 0000000D.00000003.1947408964.000002411365C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.000002411365C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
        Source: firefox.exe, 0000000D.00000003.1792775580.0000024113AE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0W
        Source: firefox.exe, 0000000D.00000003.1947408964.000002411365C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.000002411365C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792775580.0000024113AE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://www.mozilla.com0
        Source: firefox.exe, 0000000D.00000003.1945845226.000002411828C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2005/app-updatex
        Source: firefox.exe, 0000000D.00000003.1937487846.00000241186BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923320677.00000241140AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920166488.00000241186AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1779651815.0000024110B6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1941374852.00000241140AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
        Source: mozilla-temp-41.13.drString found in binary or memory: http://www.videolan.org/x264.html
        Source: firefox.exe, 0000000D.00000003.1941538046.0000024113ADD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923466951.0000024113ADD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792097373.00000241187EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792775580.0000024113AE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: firefox.exe, 0000000D.00000003.1941538046.0000024113ADD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923466951.0000024113ADD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792097373.00000241187EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792775580.0000024113AE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: firefox.exe, 0000000D.00000003.1794031114.0000024112044000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://youtube.com/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
        Source: firefox.exe, 0000000D.00000003.1951008802.00000241126DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
        Source: firefox.exe, 0000000D.00000003.1923635183.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947043348.0000024113674000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
        Source: firefox.exe, 0000000D.00000003.1938756043.000002411853F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920651269.000002411853F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
        Source: firefox.exe, 0000000D.00000003.1938756043.000002411857D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1777695946.000002411857D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920651269.000002411857D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
        Source: firefox.exe, 0000000D.00000003.1927390615.000002410DA65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwdMO
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwderIdL
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
        Source: firefox.exe, 0000000D.00000003.1779175781.0000024110BC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1934949221.00000241192A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1779175781.0000024110BE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
        Source: firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://allegro.pl/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
        Source: firefox.exe, 0000000D.00000003.1929835325.000002411A20C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
        Source: firefox.exe, 0000000D.00000003.1938756043.000002411858E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
        Source: firefox.exe, 0000000D.00000003.1941322146.00000241140B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
        Source: firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
        Source: firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
        Source: firefox.exe, 0000000D.00000003.1934949221.00000241192EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1539075
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1607439
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1616739
        Source: firefox.exe, 0000000D.00000003.1799479243.0000024111677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1694699#c21
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
        Source: firefox.exe, 0000000D.00000003.1794627454.000002411135A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
        Source: firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
        Source: firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1937883769.00000241186AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
        Source: firefox.exe, 0000000D.00000003.1937272588.0000024118730000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
        Source: firefox.exe, 0000000D.00000003.1774134355.0000024118823000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/setPointerCaptureElementReleaseCaptureWarning
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#EncryptionPreventDefaultFromP
        Source: firefox.exe, 0000000D.00000003.1807626734.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860652966.00000241114D4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860365377.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805007995.00000241114CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
        Source: firefox.exe, 0000000D.00000003.1774134355.0000024118823000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?t=ffab&q=
        Source: firefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
        Source: firefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://extensionworkshop.com/documentation/publish/self-distribution/
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1946328231.0000024113690000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5B12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF54113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
        Source: firefox.exe, 0000000D.00000003.1781215541.0000024118981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1946328231.0000024113690000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5B12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF54113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
        Source: firefox.exe, 0000000D.00000003.1946990203.0000024113684000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
        Source: firefox.exe, 0000000D.00000003.1946990203.0000024113684000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
        Source: firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1929835325.000002411A20C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5B2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF54130000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
        Source: firefox.exe, 0000000D.00000003.1946990203.0000024113684000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
        Source: firefox.exe, 0000000D.00000003.1940448385.0000024118495000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
        Source: firefox.exe, 0000000D.00000003.1946990203.0000024113684000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/cfworker
        Source: firefox.exe, 0000000D.00000003.1774134355.0000024118823000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
        Source: firefox.exe, 0000000D.00000003.1865156176.0000024118807000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
        Source: firefox.exe, 0000000D.00000003.1865156176.0000024118807000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
        Source: firefox.exe, 0000000D.00000003.1738566380.000002411005A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/w3c/csswg-drafts/blob/master/css-grid-2/MASONRY-EXPLAINER.md
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/w3c/csswg-drafts/issues/4650
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gpuweb.github.io/gpuweb/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
        Source: firefox.exe, 0000000D.00000003.1851713577.00000241193F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1932002769.00000241197E3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907664478.00000241197E3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1873349079.000002411934E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1919361885.00000241197E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853184913.000002411934B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
        Source: firefox.exe, 0000000D.00000003.1932980087.0000024119791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1919623782.000002411978C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
        Source: firefox.exe, 0000000D.00000003.1937487846.00000241186E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920166488.00000241186E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1777473779.00000241186CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
        Source: prefs-1.js.13.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
        Source: firefox.exe, 0000000D.00000003.1946328231.0000024113690000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
        Source: firefox.exe, 0000000D.00000003.1940676335.0000024118445000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/messaging-system/1/a5d6ec76-765c-4778-
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
        Source: firefox.exe, 0000000D.00000003.1935876761.00000241187C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1919766075.00000241187B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema.
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema./
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/=
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
        Source: firefox.exe, 0000000D.00000003.1795043366.00000241107C0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1794185568.00000241113BC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778877722.00000241113BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
        Source: firefox.exe, 0000000D.00000003.1841990900.000002411148B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1807626734.000002411148B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805007995.000002411148B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947043348.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.000002411148B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860365377.000002411148B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
        Source: firefox.exe, 0000000D.00000003.1841990900.000002411148B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1807626734.000002411148B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805007995.000002411148B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.000002411148B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860365377.000002411148B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.comZy
        Source: firefox.exe, 0000000D.00000003.1923635183.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947043348.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1948233924.0000024112CF1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1925156745.0000024112CF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
        Source: firefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
        Source: firefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
        Source: firefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
        Source: firefox.exe, 00000014.00000002.3546546206.000001DF5418F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
        Source: firefox.exe, 0000000D.00000003.1841990900.000002411144C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mochitest.youtube.com/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
        Source: firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
        Source: firefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
        Source: firefox.exe, 0000000D.00000003.1807626734.000002411144C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.000002411144E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1841990900.000002411144C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.hbomax.com/page/
        Source: firefox.exe, 0000000D.00000003.1807626734.000002411144C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.000002411144E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1841990900.000002411144C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.hbomax.com/player/
        Source: firefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
        Source: firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
        Source: firefox.exe, 0000000D.00000003.1923209545.00000241140B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1941322146.00000241140B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2&
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
        Source: firefox.exe, 0000000D.00000003.1934042316.00000241194DD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907993766.00000241194DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
        Source: firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
        Source: firefox.exe, 0000000D.00000003.1807626734.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860652966.00000241114D4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860365377.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805007995.00000241114CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
        Source: firefox.exe, 0000000D.00000003.1919361885.00000241197E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
        Source: firefox.exe, 0000000D.00000003.1934839666.00000241192FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
        Source: firefox.exe, 0000000D.00000003.1933392345.0000024119705000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931896492.00000241197F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
        Source: firefox.exe, 0000000D.00000003.1779651815.0000024110B7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/facebook.svg
        Source: firefox.exe, 0000000D.00000003.1779651815.0000024110B7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/play.svg
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
        Source: firefox.exe, 0000000D.00000003.1938756043.00000241185A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920651269.00000241185A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1777695946.00000241185A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5B12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF54113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938756043.000002411858E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
        Source: firefox.exe, 0000000D.00000003.1945919915.0000024118270000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792696509.0000024118220000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
        Source: firefox.exe, 0000000D.00000003.1934949221.00000241192A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
        Source: firefox.exe, 0000000D.00000003.1779175781.0000024110BC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1934949221.00000241192A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1779175781.0000024110BE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
        Source: places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
        Source: firefox.exe, 0000000D.00000003.1951008802.00000241126E1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1954436118.00000241126E1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778821418.00000241126E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
        Source: firefox.exe, 0000000D.00000003.1919429201.00000241197BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1932564629.00000241197BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
        Source: places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411845B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsMediaPlatformDecoderNotFound
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411845B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsMediaWMFNeeded
        Source: firefox.exe, 0000000D.00000003.1899534497.0000024112BB9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862900122.0000024112BA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings
        Source: firefox.exe, 0000000D.00000003.1791350941.000002411A2BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918029711.000002411A2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907161244.000002411A2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1928479876.000002411A2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944467146.000002411A2BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
        Source: places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.
        Source: firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-3.1
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc7515#appendix-C)
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
        Source: firefox.exe, 0000000D.00000003.1907161244.000002411A2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938172126.000002411868A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
        Source: firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
        Source: firefox.exe, 0000000D.00000003.1938288283.0000024118679000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920166488.0000024118679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://watch.sling.com/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
        Source: firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
        Source: firefox.exe, 0000000D.00000003.1792297176.000002411848D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1940448385.0000024118495000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
        Source: firefox.exe, 0000000D.00000003.1774134355.0000024118823000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
        Source: firefox.exe, 0000000D.00000003.1935876761.00000241187F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
        Source: firefox.exe, 0000000D.00000003.1935876761.00000241187F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
        Source: firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
        Source: firefox.exe, 0000000D.00000003.1802713041.0000024119A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
        Source: firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
        Source: firefox.exe, 0000000D.00000003.1738566380.000002411005A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881250591.0000024119142000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867394012.0000024119142000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
        Source: firefox.exe, 0000000D.00000003.1794994215.0000024110A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
        Source: firefox.exe, 0000000D.00000003.1935876761.00000241187F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
        Source: firefox.exe, 0000000D.00000003.1935876761.00000241187F8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920166488.0000024118688000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938172126.000002411868A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
        Source: firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
        Source: firefox.exe, 0000000D.00000003.1920166488.0000024118688000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938172126.000002411868A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
        Source: firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bbc.co.uk/
        Source: firefox.exe, 0000000D.00000003.1920166488.0000024118688000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938172126.000002411868A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ctrip.com/
        Source: firefox.exe, 0000000D.00000003.1960719279.000002410DA71000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1960464072.000002410DA8D000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: https://www.digicert.com/CPS0
        Source: firefox.exe, 0000000D.00000003.1920166488.0000024118688000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938172126.000002411868A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.co.uk/
        Source: firefox.exe, 0000000D.00000003.1935876761.00000241187F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.de/
        Source: firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
        Source: firefox.exe, 0000000D.00000003.1792297176.000002411848D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1953856340.00000241136EE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1940448385.0000024118495000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
        Source: firefox.exe, 0000000D.00000003.1938756043.000002411859A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1777695946.000002411859A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920651269.000002411859A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
        Source: firefox.exe, 0000000D.00000003.1794031114.0000024112044000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1772697112.0000024113BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
        Source: firefox.exe, 0000000D.00000003.1794627454.000002411135A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
        Source: firefox.exe, 0000000D.00000003.1794523921.0000024111391000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881250591.0000024119142000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867394012.0000024119142000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
        Source: firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
        Source: firefox.exe, 0000000D.00000003.1807626734.000002411144C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.000002411144E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1841990900.000002411144C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hulu.com/watch/
        Source: firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ifeng.com/
        Source: firefox.exe, 0000000D.00000003.1807626734.000002411144C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.000002411144E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1841990900.000002411144C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.instagram.com/
        Source: firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.iqiyi.com/
        Source: firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
        Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
        Source: firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
        Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.
        Source: firefox.exe, 0000000D.00000003.1781215541.0000024118981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
        Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.
        Source: targeting.snapshot.json.tmp.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
        Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
        Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
        Source: firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
        Source: firefox.exe, 00000014.00000002.3546546206.000001DF541F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/:
        Source: firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
        Source: firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/O)
        Source: firefox.exe, 00000010.00000002.3546366136.000001BAF5BC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/YK
        Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: firefox.exe, 0000000D.00000003.1923635183.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947043348.0000024113674000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
        Source: firefox.exe, 0000000D.00000003.1792297176.000002411848D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1935876761.00000241187F8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1940448385.0000024118495000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
        Source: firefox.exe, 0000000D.00000003.1907161244.000002411A2B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
        Source: firefox.exe, 0000000D.00000003.1938288283.0000024118679000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920166488.0000024118679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
        Source: firefox.exe, 0000000D.00000003.1935876761.00000241187F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
        Source: firefox.exe, 00000014.00000002.3546546206.000001DF5410C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
        Source: firefox.exe, 0000000D.00000003.1792297176.000002411848D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1940448385.0000024118495000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
        Source: firefox.exe, 0000000D.00000003.1940509024.000002411845B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xhr.spec.whatwg.org/#sync-warning
        Source: firefox.exe, 0000000D.00000003.1955877303.00000241125E5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1778334242.00000241127F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1940448385.0000024118495000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1882760897.000002411142B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
        Source: firefox.exe, 0000000D.00000003.1792696509.0000024118220000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
        Source: recovery.jsonlz4.tmp.13.drString found in binary or memory: https://youtube.com/account?=
        Source: firefox.exe, 00000014.00000002.3545775587.000001DF53F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig
        Source: firefox.exe, 0000000D.00000003.1938756043.000002411858E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548932292.00000207F7CE4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3545307610.00000207F77DA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3545074855.000001BAF5810000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3549199711.000001BAF5CC4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3545074855.000001BAF581A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3545775587.000001DF53F24000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3544826444.000001DF53E10000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3544826444.000001DF53E1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
        Source: firefox.exe, 0000000B.00000002.1720238818.000001571602A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1727121658.000002C3AD901000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
        Source: firefox.exe, 0000000F.00000002.3545307610.00000207F77DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd/AvB
        Source: firefox.exe, 0000000F.00000002.3545307610.00000207F77D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd;AvV
        Source: firefox.exe, 0000000D.00000003.1961858358.000002410DA57000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1962868418.000002410DA57000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1963760513.000002410DA57000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927390615.000002410DA57000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548932292.00000207F7CE4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3545307610.00000207F77D0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3545074855.000001BAF5810000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3549199711.000001BAF5CC4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3545775587.000001DF53F24000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3544826444.000001DF53E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
        Source: firefox.exe, 00000010.00000002.3549199711.000001BAF5CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sigs
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
        Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
        Source: unknownNetwork traffic detected: HTTP traffic on port 50055 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50055
        Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
        Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
        Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
        Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
        Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50034
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
        Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49764 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49770 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49769 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49772 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49773 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 151.101.1.91:443 -> 192.168.2.4:49775 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49777 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49780 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49779 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49778 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49833 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49831 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49832 version: TLS 1.2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0058EAFF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0058ED6A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0058EAFF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0057AA57
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005A9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_005A9576

        System Summary

        barindex
        Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
        Source: file.exe, 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2ba3ad1e-7
        Source: file.exe, 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_186672ef-8
        Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1d3fc00a-4
        Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2e440f1c-0
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001BAF5C29272 NtQuerySystemInformation,16_2_000001BAF5C29272
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001BAF5C22CF7 NtQuerySystemInformation,16_2_000001BAF5C22CF7
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0057D5EB
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00571201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00571201
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0057E8F6
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0051BF400_2_0051BF40
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005820460_2_00582046
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005180600_2_00518060
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005782980_2_00578298
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0054E4FF0_2_0054E4FF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0054676B0_2_0054676B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005A48730_2_005A4873
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0051CAF00_2_0051CAF0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0053CAA00_2_0053CAA0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0052CC390_2_0052CC39
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00546DD90_2_00546DD9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0052B1190_2_0052B119
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005191C00_2_005191C0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005313940_2_00531394
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005317060_2_00531706
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0053781B0_2_0053781B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0052997D0_2_0052997D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005179200_2_00517920
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005319B00_2_005319B0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00537A4A0_2_00537A4A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00531C770_2_00531C77
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00537CA70_2_00537CA7
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0059BE440_2_0059BE44
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00549EEE0_2_00549EEE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00531F320_2_00531F32
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001BAF5C2927216_2_000001BAF5C29272
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001BAF5C22CF716_2_000001BAF5C22CF7
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001BAF5C2999C16_2_000001BAF5C2999C
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001BAF5C292B216_2_000001BAF5C292B2
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 0052F9F2 appears 31 times
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 00530A30 appears 46 times
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: classification engineClassification label: mal72.troj.evad.winEXE@34/41@73/12
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005837B5 GetLastError,FormatMessageW,0_2_005837B5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005710BF AdjustTokenPrivileges,CloseHandle,0_2_005710BF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005716C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_005716C3
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005851CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_005851CD
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0057D4DC
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0058648E
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005142A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005142A2
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7316:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7416:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7608:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7480:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7544:120:WilError_03
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
        Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;Fy6
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;-
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9'
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9
        Source: firefox.exe, 0000000D.00000003.1936841140.0000024118764000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
        Source: file.exeReversingLabs: Detection: 47%
        Source: file.exeVirustotal: Detection: 41%
        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
        Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4545e727-0c1a-4468-96bf-5b74738a9406} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 2410036fd10 socket
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3572 -parentBuildID 20230927232528 -prefsHandle 4496 -prefMapHandle 4492 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {11f93443-0807-4a81-8b55-bb39ff0fc5bb} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 24110c63e10 rdd
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5160 -prefMapHandle 5156 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b805f6f-7f96-4d47-a250-29f74ce1fae6} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 24100371b10 utility
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4545e727-0c1a-4468-96bf-5b74738a9406} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 2410036fd10 socketJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3572 -parentBuildID 20230927232528 -prefsHandle 4496 -prefMapHandle 4492 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {11f93443-0807-4a81-8b55-bb39ff0fc5bb} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 24110c63e10 rddJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5160 -prefMapHandle 5156 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b805f6f-7f96-4d47-a250-29f74ce1fae6} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 24100371b10 utilityJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1966125840.000002411B911000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
        Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000D.00000003.1969719121.000002410DA9D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1971594718.000002410DA9D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000D.00000003.1969719121.000002410DA9D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1968246443.000002411B911000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
        Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1966125840.000002411B911000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1971594718.000002410DA9D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1968246443.000002411B911000.00000004.00000020.00020000.00000000.sdmp
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005142DE
        Source: gmpopenh264.dll.tmp.13.drStatic PE information: section name: .rodata
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00530A76 push ecx; ret 0_2_00530A89
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0052F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0052F98E
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005A1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_005A1C41
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96273
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001BAF5C29272 rdtsc 16_2_000001BAF5C29272
        Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.7 %
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0057DBBE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005868EE FindFirstFileW,FindClose,0_2_005868EE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0058698F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0057D076
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0057D3A9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00589642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00589642
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0058979D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00589B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00589B2B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00585C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00585C97
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005142DE
        Source: firefox.exe, 00000010.00000002.3545074855.000001BAF581A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
        Source: firefox.exe, 00000010.00000002.3549439283.000001BAF6140000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3544826444.000001DF53E1A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3548877056.000001DF54200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: firefox.exe, 0000000F.00000002.3549281617.00000207F7D17000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
        Source: firefox.exe, 00000010.00000002.3549439283.000001BAF6140000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll]w
        Source: firefox.exe, 0000000F.00000002.3545307610.00000207F77DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll`Av
        Source: firefox.exe, 0000000F.00000002.3545307610.00000207F77DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW c
        Source: firefox.exe, 0000000F.00000002.3545307610.00000207F77DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWvl|
        Source: firefox.exe, 0000000F.00000002.3549749106.00000207F7E08000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3549439283.000001BAF6140000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001BAF5C29272 rdtsc 16_2_000001BAF5C29272
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0058EAA2 BlockInput,0_2_0058EAA2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00542622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00542622
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005142DE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00534CE8 mov eax, dword ptr fs:[00000030h]0_2_00534CE8
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00570B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00570B62
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00542622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00542622
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0053083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0053083F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005309D5 SetUnhandledExceptionFilter,0_2_005309D5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00530C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00530C21
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00571201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00571201
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00552BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00552BA5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0057B226 SendInput,keybd_event,0_2_0057B226
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005922DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_005922DA
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00570B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00570B62
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00571663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00571663
        Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
        Source: file.exeBinary or memory string: Shell_TrayWnd
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00530698 cpuid 0_2_00530698
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00588195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00588195
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0056D27A GetUserNameW,0_2_0056D27A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0054BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0054BB6F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005142DE

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000000.00000003.1749194237.0000000000DAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.1749451115.0000000000DB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file.exe PID: 7292, type: MEMORYSTR
        Source: file.exeBinary or memory string: WIN_81
        Source: file.exeBinary or memory string: WIN_XP
        Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
        Source: file.exeBinary or memory string: WIN_XPe
        Source: file.exeBinary or memory string: WIN_VISTA
        Source: file.exeBinary or memory string: WIN_7
        Source: file.exeBinary or memory string: WIN_8

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000003.1749194237.0000000000DAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.1749451115.0000000000DB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file.exe PID: 7292, type: MEMORYSTR
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00591204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00591204
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00591806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00591806
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure2
        Valid Accounts
        1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        2
        Disable or Modify Tools
        21
        Input Capture
        2
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        2
        Valid Accounts
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop Protocol21
        Input Capture
        12
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Extra Window Memory Injection
        2
        Obfuscated Files or Information
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin Shares3
        Clipboard Data
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
        Valid Accounts
        1
        DLL Side-Loading
        NTDS16
        System Information Discovery
        Distributed Component Object ModelInput Capture3
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
        Access Token Manipulation
        1
        Extra Window Memory Injection
        LSA Secrets131
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
        Process Injection
        1
        Masquerading
        Cached Domain Credentials1
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Valid Accounts
        DCSync3
        Process Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Virtualization/Sandbox Evasion
        Proc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
        Access Token Manipulation
        /etc/passwd and /etc/shadow1
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
        Process Injection
        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543500 Sample: file.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 34 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of sandbox detection 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 223 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 youtube.com 142.250.184.206, 443, 49738, 49739 GOOGLEUS United States 19->51 53 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49740, 49744, 49752 GOOGLEUS United States 19->53 55 10 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        file.exe47%ReversingLabsWin32.Trojan.CredentialFlusher
        file.exe41%VirustotalBrowse
        file.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
        No Antivirus matches
        SourceDetectionScannerLabelLink
        example.org0%VirustotalBrowse
        star-mini.c10r.facebook.com0%VirustotalBrowse
        prod.classify-client.prod.webservices.mozgcp.net0%VirustotalBrowse
        prod.balrog.prod.cloudops.mozgcp.net0%VirustotalBrowse
        SourceDetectionScannerLabelLink
        https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l0%URL Reputationsafe
        http://detectportal.firefox.com/0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%0%URL Reputationsafe
        http://www.mozilla.com00%URL Reputationsafe
        https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
        https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl0%URL Reputationsafe
        https://merino.services.mozilla.com/api/v1/suggest0%URL Reputationsafe
        https://json-schema.org/draft/2019-09/schema.0%URL Reputationsafe
        https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect0%URL Reputationsafe
        https://www.leboncoin.fr/0%URL Reputationsafe
        https://spocs.getpocket.com/spocs0%URL Reputationsafe
        https://shavar.services.mozilla.com0%URL Reputationsafe
        https://completion.amazon.com/search/complete?q=0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report0%URL Reputationsafe
        https://ads.stickyadstv.com/firefox-etp0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab0%URL Reputationsafe
        https://monitor.firefox.com/breach-details/0%URL Reputationsafe
        https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM0%URL Reputationsafe
        https://xhr.spec.whatwg.org/#sync-warning0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/addons/addon/0%URL Reputationsafe
        https://tracking-protection-issues.herokuapp.com/new0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report0%URL Reputationsafe
        https://content-signature-2.cdn.mozilla.net/0%URL Reputationsafe
        https://json-schema.org/draft/2020-12/schema/=0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report0%URL Reputationsafe
        https://api.accounts.firefox.com/v10%URL Reputationsafe
        https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc0%URL Reputationsafe
        https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield0%URL Reputationsafe
        https://MD8.mozilla.org/1/m0%URL Reputationsafe
        https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=0%URL Reputationsafe
        https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-1520%URL Reputationsafe
        https://bugzilla.mo0%URL Reputationsafe
        https://mitmdetection.services.mozilla.com/0%URL Reputationsafe
        https://static.adsafeprotected.com/firefox-etp-js0%URL Reputationsafe
        https://shavar.services.mozilla.com/0%URL Reputationsafe
        https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture0%URL Reputationsafe
        https://spocs.getpocket.com/0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/abuse/report/addon/0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%0%URL Reputationsafe
        https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f0%URL Reputationsafe
        https://support.mozilla.org/products/firefoxgro.allizom.troppus.0%URL Reputationsafe
        https://monitor.firefox.com/user/breach-stats?includeResolved=true0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report0%URL Reputationsafe
        https://bugzilla.mozilla.org/show_bug.cgi?id=15844640%URL Reputationsafe
        https://safebrowsing.google.com/safebrowsing/diagnostic?site=0%URL Reputationsafe
        https://monitor.firefox.com/user/dashboard0%URL Reputationsafe
        https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID0%URL Reputationsafe
        https://monitor.firefox.com/about0%URL Reputationsafe
        https://account.bellmedia.c0%URL Reputationsafe
        https://login.microsoftonline.com0%URL Reputationsafe
        https://coverage.mozilla.org0%URL Reputationsafe
        http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
        https://www.zhihu.com/0%URL Reputationsafe
        http://x1.c.lencr.org/00%URL Reputationsafe
        http://x1.i.lencr.org/00%URL Reputationsafe
        https://infra.spec.whatwg.org/#ascii-whitespace0%URL Reputationsafe
        https://blocked.cdn.mozilla.net/0%URL Reputationsafe
        https://json-schema.org/draft/2019-09/schema0%URL Reputationsafe
        http://developer.mozilla.org/en/docs/DOM:element.addEventListener0%URL Reputationsafe
        https://duckduckgo.com/?t=ffab&q=0%URL Reputationsafe
        https://profiler.firefox.com0%URL Reputationsafe
        https://outlook.live.com/default.aspx?rru=compose&to=%s0%URL Reputationsafe
        https://identity.mozilla.com/apps/relay0%URL Reputationsafe
        https://mozilla.cloudflare-dns.com/dns-query0%URL Reputationsafe
        https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings20%URL Reputationsafe
        https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
        https://contile.services.mozilla.com/v1/tiles0%URL Reputationsafe
        https://monitor.firefox.com/user/preferences0%URL Reputationsafe
        https://screenshots.firefox.com/0%URL Reputationsafe
        https://gpuweb.github.io/gpuweb/0%URL Reputationsafe
        http://json-schema.org/draft-07/schema#-0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report0%URL Reputationsafe
        https://www.wykop.pl/0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        example.org
        93.184.215.14
        truefalseunknown
        star-mini.c10r.facebook.com
        157.240.253.35
        truefalseunknown
        prod.classify-client.prod.webservices.mozgcp.net
        35.190.72.216
        truefalseunknown
        prod.balrog.prod.cloudops.mozgcp.net
        35.244.181.201
        truefalseunknown
        twitter.com
        104.244.42.129
        truefalse
          unknown
          prod.detectportal.prod.cloudops.mozgcp.net
          34.107.221.82
          truefalse
            unknown
            services.addons.mozilla.org
            151.101.1.91
            truefalse
              unknown
              dyna.wikimedia.org
              185.15.59.224
              truefalse
                unknown
                prod.remote-settings.prod.webservices.mozgcp.net
                34.149.100.209
                truefalse
                  unknown
                  contile.services.mozilla.com
                  34.117.188.166
                  truefalse
                    unknown
                    youtube.com
                    142.250.184.206
                    truefalse
                      unknown
                      prod.content-signature-chains.prod.webservices.mozgcp.net
                      34.160.144.191
                      truefalse
                        unknown
                        youtube-ui.l.google.com
                        142.250.74.206
                        truefalse
                          unknown
                          us-west1.prod.sumo.prod.webservices.mozgcp.net
                          34.149.128.2
                          truefalse
                            unknown
                            reddit.map.fastly.net
                            151.101.129.140
                            truefalse
                              unknown
                              ipv4only.arpa
                              192.0.0.170
                              truefalse
                                unknown
                                prod.ads.prod.webservices.mozgcp.net
                                34.117.188.166
                                truefalse
                                  unknown
                                  push.services.mozilla.com
                                  34.107.243.93
                                  truefalse
                                    unknown
                                    normandy-cdn.services.mozilla.com
                                    35.201.103.21
                                    truefalse
                                      unknown
                                      telemetry-incoming.r53-2.services.mozilla.com
                                      34.120.208.123
                                      truefalse
                                        unknown
                                        www.reddit.com
                                        unknown
                                        unknownfalse
                                          unknown
                                          spocs.getpocket.com
                                          unknown
                                          unknownfalse
                                            unknown
                                            content-signature-2.cdn.mozilla.net
                                            unknown
                                            unknownfalse
                                              unknown
                                              support.mozilla.org
                                              unknown
                                              unknownfalse
                                                unknown
                                                firefox.settings.services.mozilla.com
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  www.youtube.com
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    www.facebook.com
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      detectportal.firefox.com
                                                      unknown
                                                      unknownfalse
                                                        unknown
                                                        normandy.cdn.mozilla.net
                                                        unknown
                                                        unknownfalse
                                                          unknown
                                                          shavar.services.mozilla.com
                                                          unknown
                                                          unknownfalse
                                                            unknown
                                                            www.wikipedia.org
                                                            unknown
                                                            unknownfalse
                                                              unknown
                                                              NameSourceMaliciousAntivirus DetectionReputation
                                                              https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                unknown
                                                                https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 0000000D.00000003.1946990203.0000024113684000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://detectportal.firefox.com/firefox.exe, 0000000D.00000003.1931020318.0000024119ACE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.mozilla.com0gmpopenh264.dll.tmp.13.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 0000000D.00000003.1774134355.0000024118823000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000014.00000002.3546546206.000001DF5418F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://json-schema.org/draft/2019-09/schema.firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://www.leboncoin.fr/firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://spocs.getpocket.com/spocsfirefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938756043.000002411858E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozillfirefox.exe, 0000000D.00000003.1794994215.0000024110A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://shavar.services.mozilla.comfirefox.exe, 0000000D.00000003.1919361885.00000241197E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://completion.amazon.com/search/complete?q=firefox.exe, 0000000D.00000003.1794627454.000002411135A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://ads.stickyadstv.com/firefox-etpfirefox.exe, 0000000D.00000003.1779175781.0000024110BC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1934949221.00000241192A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1779175781.0000024110BE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://monitor.firefox.com/breach-details/firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://github.com/w3c/csswg-drafts/issues/4650firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://xhr.spec.whatwg.org/#sync-warningfirefox.exe, 0000000D.00000003.1940509024.000002411845B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000D.00000003.1738566380.000002411005A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881250591.0000024119142000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867394012.0000024119142000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://www.msn.comfirefox.exe, 0000000D.00000003.1923635183.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947043348.0000024113674000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000D.00000003.1738566380.000002411005A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://youtube.com/firefox.exe, 0000000D.00000003.1792696509.0000024118220000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://content-signature-2.cdn.mozilla.net/firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://json-schema.org/draft/2020-12/schema/=firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94firefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                              unknown
                                                                              https://www.instagram.com/firefox.exe, 0000000D.00000003.1807626734.000002411144C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.000002411144E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1841990900.000002411144C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://api.accounts.firefox.com/v1firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://www.amazon.com/firefox.exe, 0000000D.00000003.1802713041.0000024119A61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullScfirefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafirefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                      unknown
                                                                                      https://www.youtube.com/firefox.exe, 00000014.00000002.3546546206.000001DF5410C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://MD8.mozilla.org/1/mfirefox.exe, 0000000D.00000003.1951008802.00000241126DF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://www.bbc.co.uk/firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 0000000D.00000003.1946990203.0000024113684000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792910474.0000024113A31000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923635183.0000024113683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1942117948.0000024113A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF541D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          http://127.0.0.1:firefox.exe, 0000000D.00000003.1923209545.00000241140B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1941322146.00000241140B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1777695946.00000241185A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1777473779.00000241186BF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152firefox.exe, 0000000D.00000003.1807626734.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860652966.00000241114D4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860365377.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805007995.00000241114CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://bugzilla.mofirefox.exe, 0000000D.00000003.1934949221.00000241192EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://mitmdetection.services.mozilla.com/firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://static.adsafeprotected.com/firefox-etp-jsfirefox.exe, 0000000D.00000003.1934949221.00000241192A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://youtube.com/account?=recovery.jsonlz4.tmp.13.drfalse
                                                                                              unknown
                                                                                              https://shavar.services.mozilla.com/firefox.exe, 0000000D.00000003.1934839666.00000241192FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapturefirefox.exe, 0000000D.00000003.1940509024.000002411847D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://spocs.getpocket.com/firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5B12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3546546206.000001DF54113000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://www.iqiyi.com/firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                https://support.mozilla.org/products/firefoxgro.allizom.troppus.places.sqlite-wal.13.drfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://bugzilla.mozilla.org/show_bug.cgi?id=1584464firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://monitor.firefox.com/user/dashboardfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://monitor.firefox.com/aboutfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  http://mozilla.org/MPL/2.0/.firefox.exe, 0000000D.00000003.1841990900.00000241114DB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869262952.00000241114C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118872000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1807626734.00000241114CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1799479243.0000024111677000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886481116.00000241112C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1801736862.0000024111671000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869262952.00000241114C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898082990.000002411160D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1799479243.000002411163A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879874030.0000024111642000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912391450.00000241114BE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947408964.000002411364E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792297176.000002411848D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805007995.00000241114C2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1873949705.00000241116C5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898431160.0000024111638000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1922645319.00000241184E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792297176.00000241184CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792297176.000002411844C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1805918708.00000241114CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    https://account.bellmedia.cfirefox.exe, 0000000D.00000003.1923635183.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947043348.0000024113674000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    http://youtube.com/firefox.exe, 0000000D.00000003.1794031114.0000024112044000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://login.microsoftonline.comfirefox.exe, 0000000D.00000003.1923635183.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1947043348.0000024113674000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1948233924.0000024112CF1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1925156745.0000024112CF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://coverage.mozilla.orgfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.13.drfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://www.zhihu.com/firefox.exe, 0000000D.00000003.1792297176.000002411848D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1940448385.0000024118495000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://x1.c.lencr.org/0firefox.exe, 0000000D.00000003.1941538046.0000024113ADD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923466951.0000024113ADD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792097373.00000241187EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792775580.0000024113AE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://x1.i.lencr.org/0firefox.exe, 0000000D.00000003.1941538046.0000024113ADD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923466951.0000024113ADD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792097373.00000241187EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792775580.0000024113AE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 0000000D.00000003.1775182206.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1903982039.0000024118816000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865156176.0000024118816000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://blocked.cdn.mozilla.net/firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://json-schema.org/draft/2019-09/schemafirefox.exe, 0000000D.00000003.1935876761.00000241187C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1919766075.00000241187B4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://developer.mozilla.org/en/docs/DOM:element.addEventListenerfirefox.exe, 0000000D.00000003.1940509024.000002411845B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://duckduckgo.com/?t=ffab&q=firefox.exe, 0000000D.00000003.1792097373.00000241187B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://profiler.firefox.comfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://identity.mozilla.com/apps/relayfirefox.exe, 0000000D.00000003.1932980087.0000024119791000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1919623782.000002411978C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000D.00000003.1791350941.000002411A2BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918029711.000002411A2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1907161244.000002411A2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1928479876.000002411A2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944467146.000002411A2BC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 0000000D.00000003.1870810277.000002410EA39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1740252981.000002410EA33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1741607689.000002410EA33000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfirefox.exe, 0000000F.00000002.3546693324.00000207F7BC8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3546366136.000001BAF5BE9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000014.00000002.3549073453.000001DF54303000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://contile.services.mozilla.com/v1/tilesfirefox.exe, 0000000D.00000003.1937272588.0000024118730000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://www.amazon.co.uk/firefox.exe, 0000000D.00000003.1945352729.00000241187FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://monitor.firefox.com/user/preferencesfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          https://screenshots.firefox.com/firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          https://www.google.com/searchfirefox.exe, 0000000D.00000003.1794523921.0000024111391000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881250591.0000024119142000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738200641.000002411001F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738036961.000002410FE00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867394012.0000024119142000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738726212.0000024110077000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1738379351.000002411003C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://gpuweb.github.io/gpuweb/firefox.exe, 0000000D.00000003.1792910474.0000024113A14000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://relay.firefox.com/api/v1/firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              http://json-schema.org/draft-07/schema#-firefox.exe, 0000000D.00000003.1802713041.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791649569.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1931020318.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1944969328.0000024119AC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1918680414.0000024119AC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-reportfirefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              https://topsites.services.mozilla.com/cid/firefox.exe, 0000000F.00000002.3548790301.00000207F7C00000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3545887871.000001BAF5990000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000014.00000002.3546000420.000001DF53F30000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://www.wykop.pl/firefox.exe, 0000000D.00000003.1935876761.00000241187F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://twitter.com/firefox.exe, 0000000D.00000003.1907161244.000002411A2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1938172126.000002411868A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  • No. of IPs < 25%
                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                  • 75% < No. of IPs
                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                  151.101.1.91
                                                                                                                  services.addons.mozilla.orgUnited States
                                                                                                                  54113FASTLYUSfalse
                                                                                                                  34.149.100.209
                                                                                                                  prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                  2686ATGS-MMD-ASUSfalse
                                                                                                                  34.107.243.93
                                                                                                                  push.services.mozilla.comUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  34.107.221.82
                                                                                                                  prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  35.244.181.201
                                                                                                                  prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  34.117.188.166
                                                                                                                  contile.services.mozilla.comUnited States
                                                                                                                  139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                  35.201.103.21
                                                                                                                  normandy-cdn.services.mozilla.comUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  35.190.72.216
                                                                                                                  prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  34.160.144.191
                                                                                                                  prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                  2686ATGS-MMD-ASUSfalse
                                                                                                                  142.250.184.206
                                                                                                                  youtube.comUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  34.120.208.123
                                                                                                                  telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                  15169GOOGLEUSfalse
                                                                                                                  IP
                                                                                                                  127.0.0.1
                                                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                                                  Analysis ID:1543500
                                                                                                                  Start date and time:2024-10-28 02:17:27 +01:00
                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                  Overall analysis duration:0h 7m 57s
                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                  Report type:full
                                                                                                                  Cookbook file name:default.jbs
                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                  Run name:Run with higher sleep bypass
                                                                                                                  Number of analysed new started processes analysed:22
                                                                                                                  Number of new started drivers analysed:0
                                                                                                                  Number of existing processes analysed:0
                                                                                                                  Number of existing drivers analysed:0
                                                                                                                  Number of injected processes analysed:0
                                                                                                                  Technologies:
                                                                                                                  • HCA enabled
                                                                                                                  • EGA enabled
                                                                                                                  • AMSI enabled
                                                                                                                  Analysis Mode:default
                                                                                                                  Analysis stop reason:Timeout
                                                                                                                  Sample name:file.exe
                                                                                                                  Detection:MAL
                                                                                                                  Classification:mal72.troj.evad.winEXE@34/41@73/12
                                                                                                                  EGA Information:
                                                                                                                  • Successful, ratio: 50%
                                                                                                                  HCA Information:
                                                                                                                  • Successful, ratio: 94%
                                                                                                                  • Number of executed functions: 41
                                                                                                                  • Number of non-executed functions: 314
                                                                                                                  Cookbook Comments:
                                                                                                                  • Found application associated with file extension: .exe
                                                                                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                  • Excluded IPs from analysis (whitelisted): 34.211.181.209, 52.32.18.233, 34.218.156.47, 172.217.18.14, 2.22.61.59, 2.22.61.56, 142.250.185.78, 142.250.185.106, 142.250.186.106
                                                                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, shavar.prod.mozaws.net, ciscobinary.openh264.org, slscr.update.microsoft.com, otelrules.azureedge.net, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, safebrowsing.googleapis.com, location.services.mozilla.com
                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                  • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                  No simulations
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  34.117.188.166file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                    151.101.1.91file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                        34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          34.160.144.191file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                            example.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                                            services.addons.mozilla.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                                            dyna.wikimedia.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 185.15.59.224
                                                                                                                                                                                            twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.193
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.1
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.193
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 104.244.42.193
                                                                                                                                                                                            star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.252.35
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                            FASTLYUSfile.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, XWormBrowse
                                                                                                                                                                                            • 185.199.110.133
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                                            GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                                            ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            SecuriteInfo.com.FileRepMalware.12585.5759.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                            • 57.129.0.22
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                            • 57.192.26.160
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            SecuriteInfo.com.FileRepMalware.12585.5759.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                            • 57.129.0.22
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                            • 57.192.26.160
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                            fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                            C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                              C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):7813
                                                                                                                                                                                                                                Entropy (8bit):5.184726578169337
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:192:9jMX3D0cbhbVbTbfbRbObtbyEl7nYr8JA6WnSrDtTUd/SkDr3:9YIcNhnzFSJ4rPBnSrDhUd/R
                                                                                                                                                                                                                                MD5:A3B69BC4E8458AEEFC5034EDB739DB36
                                                                                                                                                                                                                                SHA1:85B554F206D878A82CFC1617F4A88F4E8A858821
                                                                                                                                                                                                                                SHA-256:D80FA995FBD74BA467D69C5A6840603A80E7CCC82D2A1FB631362DE70A1D4F45
                                                                                                                                                                                                                                SHA-512:9907E909FEBB55F79BA0D4DBD4F0E5E7D32A031DB77BF2D728BA12654161CD97D1B252FE7DF0752835CC499E6AF18DE0856A83C746EBD0A6B05F2EDD426B64A0
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"type":"uninstall","id":"c9ccca75-d92c-4a33-b760-9957043a920c","creationDate":"2024-10-28T03:08:08.877Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):7813
                                                                                                                                                                                                                                Entropy (8bit):5.184726578169337
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:192:9jMX3D0cbhbVbTbfbRbObtbyEl7nYr8JA6WnSrDtTUd/SkDr3:9YIcNhnzFSJ4rPBnSrDhUd/R
                                                                                                                                                                                                                                MD5:A3B69BC4E8458AEEFC5034EDB739DB36
                                                                                                                                                                                                                                SHA1:85B554F206D878A82CFC1617F4A88F4E8A858821
                                                                                                                                                                                                                                SHA-256:D80FA995FBD74BA467D69C5A6840603A80E7CCC82D2A1FB631362DE70A1D4F45
                                                                                                                                                                                                                                SHA-512:9907E909FEBB55F79BA0D4DBD4F0E5E7D32A031DB77BF2D728BA12654161CD97D1B252FE7DF0752835CC499E6AF18DE0856A83C746EBD0A6B05F2EDD426B64A0
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"type":"uninstall","id":"c9ccca75-d92c-4a33-b760-9957043a920c","creationDate":"2024-10-28T03:08:08.877Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
                                                                                                                                                                                                                                Category:modified
                                                                                                                                                                                                                                Size (bytes):490
                                                                                                                                                                                                                                Entropy (8bit):7.246483341090937
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:12:l8v/7J2T+gwjz+vdzLSMO9mj253UT3BcHXhJo:82CgwS//O91iT3BUXh6
                                                                                                                                                                                                                                MD5:BD9751DFFFEFFA2154CC5913489ED58C
                                                                                                                                                                                                                                SHA1:1C9230053C45CA44883103A6ACFDF49AC53ABF45
                                                                                                                                                                                                                                SHA-256:834C4F18E96CFDAA395246183DE76032F1B77886764CEEBE52F6A146FA4D4C3B
                                                                                                                                                                                                                                SHA-512:01072F60F4B2489BB84639A6179A82A3EA90A31C1AD61D30EF27800C3114DB5E45662583E1C0B5382F51635DC14372EFC71DCD069999D6B21A5D256C70697790
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:.......................PNG........IHDR................a....IDAT8O...1P......p....d1.....v)......p.nXM.t.H.(.......B$..}_G.{.......:uN...=......s|.$...`0.....dl6.>>>p.\.v;z.......F.a:.2..D.V.....V..n...g.z.X..C...v.......=.H..d..P*...i.."...X,.B...h...xyy.V....I$..J%r....6....Z-:...P..J..........|>'...P.\&.....l6....N5...Z.x<.....h.z..'@...L&.F..'.Jq<...m6.OOO.....$..r:.......v..V..ze.\.p.R..t.Z.....r...B...3.B..0...T*E".p8.D0..`2.D.j...h..n...wF...........#......O....IEND.B`.
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                                                Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                                MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                                SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                                SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                                SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):453023
                                                                                                                                                                                                                                Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                                Encrypted:true
                                                                                                                                                                                                                                SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                                MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                                SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                                SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                                SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):5488
                                                                                                                                                                                                                                Entropy (8bit):3.305060000573604
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:48:+P9deK6UgdwZzF69deKK6BdwvFc9deKqadwN1:SKKiqj
                                                                                                                                                                                                                                MD5:36F1E34CCD6F257AD40FD52C4AF4B7F8
                                                                                                                                                                                                                                SHA1:37DD5F143CFF9D24F808B9553FC08E5DED249472
                                                                                                                                                                                                                                SHA-256:F281F43DB27609EB9D7F682600C776E0E351710C5A5D8C4F3C6599F20234D660
                                                                                                                                                                                                                                SHA-512:C52F254E378AEC008D50EBC3AFD4012EFEB993538D58475BCB8D4A258301F1AD6CCC2ED3FC917513A0086CCAF734C66D5B68B79B29EB58EA1BEEBA1ECBE90F70
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:...................................FL..................F.@.. ...p.......Z..T.(..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.I\YL.....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}W\YL.............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}W\YL...............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z...........%6i......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):5488
                                                                                                                                                                                                                                Entropy (8bit):3.305060000573604
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:48:+P9deK6UgdwZzF69deKK6BdwvFc9deKqadwN1:SKKiqj
                                                                                                                                                                                                                                MD5:36F1E34CCD6F257AD40FD52C4AF4B7F8
                                                                                                                                                                                                                                SHA1:37DD5F143CFF9D24F808B9553FC08E5DED249472
                                                                                                                                                                                                                                SHA-256:F281F43DB27609EB9D7F682600C776E0E351710C5A5D8C4F3C6599F20234D660
                                                                                                                                                                                                                                SHA-512:C52F254E378AEC008D50EBC3AFD4012EFEB993538D58475BCB8D4A258301F1AD6CCC2ED3FC917513A0086CCAF734C66D5B68B79B29EB58EA1BEEBA1ECBE90F70
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:...................................FL..................F.@.. ...p.......Z..T.(..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.I\YL.....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}W\YL.............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}W\YL...............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z...........%6i......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):5488
                                                                                                                                                                                                                                Entropy (8bit):3.305060000573604
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:48:+P9deK6UgdwZzF69deKK6BdwvFc9deKqadwN1:SKKiqj
                                                                                                                                                                                                                                MD5:36F1E34CCD6F257AD40FD52C4AF4B7F8
                                                                                                                                                                                                                                SHA1:37DD5F143CFF9D24F808B9553FC08E5DED249472
                                                                                                                                                                                                                                SHA-256:F281F43DB27609EB9D7F682600C776E0E351710C5A5D8C4F3C6599F20234D660
                                                                                                                                                                                                                                SHA-512:C52F254E378AEC008D50EBC3AFD4012EFEB993538D58475BCB8D4A258301F1AD6CCC2ED3FC917513A0086CCAF734C66D5B68B79B29EB58EA1BEEBA1ECBE90F70
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:...................................FL..................F.@.. ...p.......Z..T.(..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.I\YL.....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}W\YL.............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}W\YL...............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z...........%6i......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):5488
                                                                                                                                                                                                                                Entropy (8bit):3.305060000573604
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:48:+P9deK6UgdwZzF69deKK6BdwvFc9deKqadwN1:SKKiqj
                                                                                                                                                                                                                                MD5:36F1E34CCD6F257AD40FD52C4AF4B7F8
                                                                                                                                                                                                                                SHA1:37DD5F143CFF9D24F808B9553FC08E5DED249472
                                                                                                                                                                                                                                SHA-256:F281F43DB27609EB9D7F682600C776E0E351710C5A5D8C4F3C6599F20234D660
                                                                                                                                                                                                                                SHA-512:C52F254E378AEC008D50EBC3AFD4012EFEB993538D58475BCB8D4A258301F1AD6CCC2ED3FC917513A0086CCAF734C66D5B68B79B29EB58EA1BEEBA1ECBE90F70
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:...................................FL..................F.@.. ...p.......Z..T.(..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.I\YL.....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}W\YL.............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}W\YL...............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z...........%6i......C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):3621
                                                                                                                                                                                                                                Entropy (8bit):4.93083916996561
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLBYkX8P:8S+OBIUjOdwiOdYVjjwLGk8P
                                                                                                                                                                                                                                MD5:2E6F86BBF7D37A3D688E5EC0888BCCD3
                                                                                                                                                                                                                                SHA1:59C5E3098C9669837A67E536E5E365EA606F5E7E
                                                                                                                                                                                                                                SHA-256:A2402AA70BB4696005803C79319D1E1F121376FBC527697461A5DE275C5920B6
                                                                                                                                                                                                                                SHA-512:AFB82F86D9F71DF3083763F80D4D0540E86FF2CE242ED2F0BD6A7A31033D9F7A632314903116E7B0AE98B12507F267B236B4A5CF24D526690D5C2E9FB14662E0
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):3621
                                                                                                                                                                                                                                Entropy (8bit):4.93083916996561
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLBYkX8P:8S+OBIUjOdwiOdYVjjwLGk8P
                                                                                                                                                                                                                                MD5:2E6F86BBF7D37A3D688E5EC0888BCCD3
                                                                                                                                                                                                                                SHA1:59C5E3098C9669837A67E536E5E365EA606F5E7E
                                                                                                                                                                                                                                SHA-256:A2402AA70BB4696005803C79319D1E1F121376FBC527697461A5DE275C5920B6
                                                                                                                                                                                                                                SHA-512:AFB82F86D9F71DF3083763F80D4D0540E86FF2CE242ED2F0BD6A7A31033D9F7A632314903116E7B0AE98B12507F267B236B4A5CF24D526690D5C2E9FB14662E0
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):5312
                                                                                                                                                                                                                                Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):5312
                                                                                                                                                                                                                                Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):24
                                                                                                                                                                                                                                Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):24
                                                                                                                                                                                                                                Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):262144
                                                                                                                                                                                                                                Entropy (8bit):0.04905391753567332
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:24:DLivwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:D6wae+QtMImelekKDa5
                                                                                                                                                                                                                                MD5:DD9D28E87ED57D16E65B14501B4E54D1
                                                                                                                                                                                                                                SHA1:793839B47326441BE2D1336BA9A61C9B948C578D
                                                                                                                                                                                                                                SHA-256:BB4E6C58C50BD6399ED70468C02B584595C29F010B66F864CD4D6B427FA365BC
                                                                                                                                                                                                                                SHA-512:A2626F6A3CBADE62E38DA5987729D99830D0C6AA134D4A9E615026A5F18ACBB11A2C3C80917DAD76DA90ED5BAA9B0454D4A3C2DD04436735E78C974BA1D035B1
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):66
                                                                                                                                                                                                                                Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):66
                                                                                                                                                                                                                                Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):36830
                                                                                                                                                                                                                                Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):36830
                                                                                                                                                                                                                                Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                                                Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                                MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                                SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                                SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                                SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):1021904
                                                                                                                                                                                                                                Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                Joe Sandbox View:
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):1021904
                                                                                                                                                                                                                                Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                Joe Sandbox View:
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:ASCII text
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):116
                                                                                                                                                                                                                                Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:ASCII text
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):116
                                                                                                                                                                                                                                Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):98304
                                                                                                                                                                                                                                Entropy (8bit):0.07323501306336999
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zkiI:DLhesh7Owd4+jiI
                                                                                                                                                                                                                                MD5:825B30E00DF89C3C8EA74648C87E1B4C
                                                                                                                                                                                                                                SHA1:324C4BB2BFBA40E6F4D258927125679595C18ACF
                                                                                                                                                                                                                                SHA-256:CC9DC0BA94BF797FC1F04B49B3F017A84FB874B64ABE3C7D26AA2A535CA72CBC
                                                                                                                                                                                                                                SHA-512:CF6050D340C43EC8595767D36E2E8806FBE907AA828CA45E30D8E4F772CFA445226B96C565CFDEDEF0CBAC2234881668E474DF92DC5D50F2DADC81FF47CECC42
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                                                Entropy (8bit):0.039461165957280435
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:6:G7VevPKH8EDZm7VevPKH8EDZgL9XIwlio:cevS1KevS1+Pi
                                                                                                                                                                                                                                MD5:F372A1DECB747FA3EBADB87A1B08DE84
                                                                                                                                                                                                                                SHA1:A555F5585A2B01B5C9AE3202F912D751ACC18434
                                                                                                                                                                                                                                SHA-256:831E075AF428A611A89219B52CE980F267689876E4140805B3B09F28EAD443FF
                                                                                                                                                                                                                                SHA-512:967B811123B4D1317D8703E283884694E12DC55691AD91128E52F3B9C4D2DD7DA642291C8DDA66BC4D53B80499F4885649CAE8725817471D9AAED56AD4C94509
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:..-..........................a2.~08...t...<_0....-..........................a2.~08...t...<_0..........................................................'...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):163992
                                                                                                                                                                                                                                Entropy (8bit):0.11767138421195485
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:24:KPlcfkhLxsZ+cjxsMltTAUCF2QWUCZ7CCQE/TKCbCMxsaxQwlFHVZ2i7+:tMfQzJtUnWdU+RVxB1Zk
                                                                                                                                                                                                                                MD5:E5975F682E12E7A7728B09EE2865433F
                                                                                                                                                                                                                                SHA1:9BC4BC6A6E033DC3A60473C3E10F4C2B16599AF2
                                                                                                                                                                                                                                SHA-256:8FA8389BD941FDC477F44BD94BF31DD4E746A9B386903CA816A76B0C40C2B7A4
                                                                                                                                                                                                                                SHA-512:CF04A4E376F9EAB54D983B641FDD8463EB08B44B60881B1FED9C7651E2CCFDF55E7CDEA7D55646D4775406140BC95CB6416C0DA3F86ABF4686DAD00F486B768F
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:7....-..........~08...t...3.V..........~08...t._...M:xF................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):13254
                                                                                                                                                                                                                                Entropy (8bit):5.496326995147163
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:192:UnaRtLYbBp66hj4qyaaXv6KKHNeP5RfGNBw8dfSl:pe4qdFtwcwg0
                                                                                                                                                                                                                                MD5:A8583D297AF0D509CA1C3CFFC7D34D97
                                                                                                                                                                                                                                SHA1:E83F5296DD77D8C807E95DF32BF54EF7DCBD9CC1
                                                                                                                                                                                                                                SHA-256:8E3C92DD46CA3CCD2F26600AEC01C360E0D79D8673399E9F150C17E21446A7E8
                                                                                                                                                                                                                                SHA-512:E30C0CE6BF3649073369B903A0AAA4654BDFEC3BCF53D203633BAEE076C8512CDD6025D361BFD5D9C50176DBF4259A67A4B7F843D4212217F5D27DDE790ED2B1
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730084859);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730084859);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730084859);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173008
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):13254
                                                                                                                                                                                                                                Entropy (8bit):5.496326995147163
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:192:UnaRtLYbBp66hj4qyaaXv6KKHNeP5RfGNBw8dfSl:pe4qdFtwcwg0
                                                                                                                                                                                                                                MD5:A8583D297AF0D509CA1C3CFFC7D34D97
                                                                                                                                                                                                                                SHA1:E83F5296DD77D8C807E95DF32BF54EF7DCBD9CC1
                                                                                                                                                                                                                                SHA-256:8E3C92DD46CA3CCD2F26600AEC01C360E0D79D8673399E9F150C17E21446A7E8
                                                                                                                                                                                                                                SHA-512:E30C0CE6BF3649073369B903A0AAA4654BDFEC3BCF53D203633BAEE076C8512CDD6025D361BFD5D9C50176DBF4259A67A4B7F843D4212217F5D27DDE790ED2B1
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730084859);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730084859);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730084859);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173008
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):65536
                                                                                                                                                                                                                                Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:6:ltBl/l4/WN1h4BEJYqWvLue3FMOrMZ0l:DBl/WuntfJiFxMZO
                                                                                                                                                                                                                                MD5:18F65713B07CB441E6A98655B726D098
                                                                                                                                                                                                                                SHA1:2CEFA32BC26B25BE81C411B60C9925CB0F1F8F88
                                                                                                                                                                                                                                SHA-256:B6C268E48546B113551A5AF9CA86BB6A462A512DE6C9289315E125CEB0FD8621
                                                                                                                                                                                                                                SHA-512:A6871076C7D7ED53B630F9F144ED04303AD54A2E60B94ECA2AA96964D1AB375EEFDCA86CE0D3EB0E9DBB81470C6BD159877125A080C95EB17E54A52427F805FB
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):90
                                                                                                                                                                                                                                Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):90
                                                                                                                                                                                                                                Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5862 bytes
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):1601
                                                                                                                                                                                                                                Entropy (8bit):6.356520342589616
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:24:vkSUGlcAxS7E9LXnIgm/pnxQwRls6Zsp9bGH3j6xiM3FtdL/5QH2oXpTurD/I0DO:cpOx4SGnRTZY9qGxH3F5kpTgwcR4
                                                                                                                                                                                                                                MD5:C0CFD660642ACFB5653982B99B7A1DC6
                                                                                                                                                                                                                                SHA1:C564561BA44E1DD4C8439F314BEB597FF055E0FB
                                                                                                                                                                                                                                SHA-256:6EFA3735A1456790B0C9E0DF550D204AB10C19A5E8A2972240EDD0970A6E0D32
                                                                                                                                                                                                                                SHA-512:46D18A16A220D5F2F52CB3D3D6FF0CA70FA5FF0DF03036EFD0268375EE69776A3FFFB893DFD89DE50EEC116B45D802FDE8C08E4590ADF4C44D860ABF20BFF3C8
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{6e2b8f9d-84e7-4a6b-a1bd-3375341b7ddb}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730084878645,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1280,"height":1024,"screenX......Y..Aizem..."maximize......BeforeMin...&..workspace:...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zE..1...Wn..m........k..;....1":{..mUpdate...startTim..P28509...centCrash..B0},".....Dcook.. hod..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,a.Donly..fexpiry...44163,"originA...."
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5862 bytes
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):1601
                                                                                                                                                                                                                                Entropy (8bit):6.356520342589616
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:24:vkSUGlcAxS7E9LXnIgm/pnxQwRls6Zsp9bGH3j6xiM3FtdL/5QH2oXpTurD/I0DO:cpOx4SGnRTZY9qGxH3F5kpTgwcR4
                                                                                                                                                                                                                                MD5:C0CFD660642ACFB5653982B99B7A1DC6
                                                                                                                                                                                                                                SHA1:C564561BA44E1DD4C8439F314BEB597FF055E0FB
                                                                                                                                                                                                                                SHA-256:6EFA3735A1456790B0C9E0DF550D204AB10C19A5E8A2972240EDD0970A6E0D32
                                                                                                                                                                                                                                SHA-512:46D18A16A220D5F2F52CB3D3D6FF0CA70FA5FF0DF03036EFD0268375EE69776A3FFFB893DFD89DE50EEC116B45D802FDE8C08E4590ADF4C44D860ABF20BFF3C8
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{6e2b8f9d-84e7-4a6b-a1bd-3375341b7ddb}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730084878645,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1280,"height":1024,"screenX......Y..Aizem..."maximize......BeforeMin...&..workspace:...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zE..1...Wn..m........k..;....1":{..mUpdate...startTim..P28509...centCrash..B0},".....Dcook.. hod..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,a.Donly..fexpiry...44163,"originA...."
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5862 bytes
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):1601
                                                                                                                                                                                                                                Entropy (8bit):6.356520342589616
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:24:vkSUGlcAxS7E9LXnIgm/pnxQwRls6Zsp9bGH3j6xiM3FtdL/5QH2oXpTurD/I0DO:cpOx4SGnRTZY9qGxH3F5kpTgwcR4
                                                                                                                                                                                                                                MD5:C0CFD660642ACFB5653982B99B7A1DC6
                                                                                                                                                                                                                                SHA1:C564561BA44E1DD4C8439F314BEB597FF055E0FB
                                                                                                                                                                                                                                SHA-256:6EFA3735A1456790B0C9E0DF550D204AB10C19A5E8A2972240EDD0970A6E0D32
                                                                                                                                                                                                                                SHA-512:46D18A16A220D5F2F52CB3D3D6FF0CA70FA5FF0DF03036EFD0268375EE69776A3FFFB893DFD89DE50EEC116B45D802FDE8C08E4590ADF4C44D860ABF20BFF3C8
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{6e2b8f9d-84e7-4a6b-a1bd-3375341b7ddb}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730084878645,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1280,"height":1024,"screenX......Y..Aizem..."maximize......BeforeMin...&..workspace:...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zE..1...Wn..m........k..;....1":{..mUpdate...startTim..P28509...centCrash..B0},".....Dcook.. hod..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,a.Donly..fexpiry...44163,"originA...."
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):4096
                                                                                                                                                                                                                                Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                                MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                                SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                                SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                                SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):4537
                                                                                                                                                                                                                                Entropy (8bit):5.034072205905048
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:48:YrSAY26UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyJW:yc2yTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                MD5:26A9451AB6E439E105C7E48DFB26F805
                                                                                                                                                                                                                                SHA1:E7CD9E8B624584DDDB1F64E16ADDCC7106191498
                                                                                                                                                                                                                                SHA-256:693C368641B31F6284EFA4726C308B20F406266450E9C6633E3E724D4C9D5BA4
                                                                                                                                                                                                                                SHA-512:5AA9DC9E20471D3CB8F72459A22E527A0BD58DD89612FAB3D6F5CCD23AF2E0B9FAA87C8AD469909B86793E81BB9A8690026D99C64538724104ADD943282FBFE4
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-28T03:07:29.777Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):4537
                                                                                                                                                                                                                                Entropy (8bit):5.034072205905048
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:48:YrSAY26UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyJW:yc2yTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                MD5:26A9451AB6E439E105C7E48DFB26F805
                                                                                                                                                                                                                                SHA1:E7CD9E8B624584DDDB1F64E16ADDCC7106191498
                                                                                                                                                                                                                                SHA-256:693C368641B31F6284EFA4726C308B20F406266450E9C6633E3E724D4C9D5BA4
                                                                                                                                                                                                                                SHA-512:5AA9DC9E20471D3CB8F72459A22E527A0BD58DD89612FAB3D6F5CCD23AF2E0B9FAA87C8AD469909B86793E81BB9A8690026D99C64538724104ADD943282FBFE4
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-28T03:07:29.777Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):156
                                                                                                                                                                                                                                Entropy (8bit):4.411137816108237
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:YGNDhK6c2us1pNGHfYL2HEYwgL2HEmxhHtifYYMgEYyibudJ8KgfHVEW1:YGNTG/I2XV2fEzLEJ8Kgf1Ew
                                                                                                                                                                                                                                MD5:AAC5F6FC2FA4A5691A244B46164834FD
                                                                                                                                                                                                                                SHA1:F011E46647F4C402B798C285DE982A6BB9EC73BF
                                                                                                                                                                                                                                SHA-256:BE115879DA967E2C1213870515E049801E5950D1179325B99891869A40263BB0
                                                                                                                                                                                                                                SHA-512:963486CF702B7623C20123B669F538ADBC51B996E67AB52EDE4635FF05034CA28A3926A98656CB5E8E9BB2C1FBAD338744B312B4673585FD9810AA6E36D343EC
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"chrome://browser/content/browser.xhtml":{"sidebar-box":{"sidebarcommand":"","style":""},"sidebar-title":{"value":""},"main-window":{"sizemode":"normal"}}}
                                                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                                                Size (bytes):156
                                                                                                                                                                                                                                Entropy (8bit):4.411137816108237
                                                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                                                SSDEEP:3:YGNDhK6c2us1pNGHfYL2HEYwgL2HEmxhHtifYYMgEYyibudJ8KgfHVEW1:YGNTG/I2XV2fEzLEJ8Kgf1Ew
                                                                                                                                                                                                                                MD5:AAC5F6FC2FA4A5691A244B46164834FD
                                                                                                                                                                                                                                SHA1:F011E46647F4C402B798C285DE982A6BB9EC73BF
                                                                                                                                                                                                                                SHA-256:BE115879DA967E2C1213870515E049801E5950D1179325B99891869A40263BB0
                                                                                                                                                                                                                                SHA-512:963486CF702B7623C20123B669F538ADBC51B996E67AB52EDE4635FF05034CA28A3926A98656CB5E8E9BB2C1FBAD338744B312B4673585FD9810AA6E36D343EC
                                                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                                                Preview:{"chrome://browser/content/browser.xhtml":{"sidebar-box":{"sidebarcommand":"","style":""},"sidebar-title":{"value":""},"main-window":{"sizemode":"normal"}}}
                                                                                                                                                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                Entropy (8bit):6.584697679004007
                                                                                                                                                                                                                                TrID:
                                                                                                                                                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                File name:file.exe
                                                                                                                                                                                                                                File size:919'552 bytes
                                                                                                                                                                                                                                MD5:158a88b989303eb0443db400eea08e23
                                                                                                                                                                                                                                SHA1:492ee65174fb3e1739c9a117099f80b816575022
                                                                                                                                                                                                                                SHA256:18d9e19df2cc995fd5e2f0c0b5f74c79b08c7f6d139f49e46f7cb893e3685950
                                                                                                                                                                                                                                SHA512:6464412853d8d7a1a08676d0628d4490105af60d83f719ec4bdf8b22191651dd682528e53a90effb0a3a7e029adf88e9c65ca9b24784cfe3b54b0fd32f8f517a
                                                                                                                                                                                                                                SSDEEP:12288:7qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga/TW:7qDEvCTbMWu7rQYlBQcBiT6rprG8abW
                                                                                                                                                                                                                                TLSH:F7159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                                Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                                Entrypoint:0x420577
                                                                                                                                                                                                                                Entrypoint Section:.text
                                                                                                                                                                                                                                Digitally signed:false
                                                                                                                                                                                                                                Imagebase:0x400000
                                                                                                                                                                                                                                Subsystem:windows gui
                                                                                                                                                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                Time Stamp:0x671EE405 [Mon Oct 28 01:08:21 2024 UTC]
                                                                                                                                                                                                                                TLS Callbacks:
                                                                                                                                                                                                                                CLR (.Net) Version:
                                                                                                                                                                                                                                OS Version Major:5
                                                                                                                                                                                                                                OS Version Minor:1
                                                                                                                                                                                                                                File Version Major:5
                                                                                                                                                                                                                                File Version Minor:1
                                                                                                                                                                                                                                Subsystem Version Major:5
                                                                                                                                                                                                                                Subsystem Version Minor:1
                                                                                                                                                                                                                                Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                                Instruction
                                                                                                                                                                                                                                call 00007FC144841343h
                                                                                                                                                                                                                                jmp 00007FC144840C4Fh
                                                                                                                                                                                                                                push ebp
                                                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                                                push esi
                                                                                                                                                                                                                                push dword ptr [ebp+08h]
                                                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                                                call 00007FC144840E2Dh
                                                                                                                                                                                                                                mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                                                pop esi
                                                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                mov eax, ecx
                                                                                                                                                                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                                mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                                ret
                                                                                                                                                                                                                                push ebp
                                                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                                                push esi
                                                                                                                                                                                                                                push dword ptr [ebp+08h]
                                                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                                                call 00007FC144840DFAh
                                                                                                                                                                                                                                mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                                                pop esi
                                                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                mov eax, ecx
                                                                                                                                                                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                                mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                                ret
                                                                                                                                                                                                                                push ebp
                                                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                                                push esi
                                                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                                                lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                and dword ptr [eax], 00000000h
                                                                                                                                                                                                                                and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                                push eax
                                                                                                                                                                                                                                mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                add eax, 04h
                                                                                                                                                                                                                                push eax
                                                                                                                                                                                                                                call 00007FC1448439EDh
                                                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                                                pop esi
                                                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                                                lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                                mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                                push eax
                                                                                                                                                                                                                                call 00007FC144843A38h
                                                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                                                ret
                                                                                                                                                                                                                                push ebp
                                                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                                                push esi
                                                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                                                lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                push eax
                                                                                                                                                                                                                                call 00007FC144843A21h
                                                                                                                                                                                                                                test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                                                Programming Language:
                                                                                                                                                                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9c28.rsrc
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                .rsrc0xd40000x9c280x9e00facb3958da18654648fe081ee7bc5cf3False0.3156398338607595data5.373963109924308IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                                RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                                RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                                RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                                RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                                RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                                RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                                RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                                RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                                RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                                RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                                RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                                RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                                RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                                RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                                RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                                RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                                RT_RCDATA0xdc7b80xef0data1.0028765690376569
                                                                                                                                                                                                                                RT_GROUP_ICON0xdd6a80x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                                RT_GROUP_ICON0xdd7200x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                RT_GROUP_ICON0xdd7340x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                                RT_GROUP_ICON0xdd7480x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                RT_VERSION0xdd75c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                                RT_MANIFEST0xdd8380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                                DLLImport
                                                                                                                                                                                                                                WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                                MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                                WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                                IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                                USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                                UxTheme.dllIsThemeActive
                                                                                                                                                                                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                                USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                                GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                                SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                                OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                EnglishGreat Britain
                                                                                                                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.091418982 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.091511011 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.092729092 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.107374907 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.107418060 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.746951103 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.753555059 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.764234066 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.764287949 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.764391899 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.764853001 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.765388966 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.447279930 CET49738443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.447329998 CET44349738142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.454597950 CET49738443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.456031084 CET49738443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.456046104 CET44349738142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.563582897 CET49739443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.563667059 CET44349739142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.565553904 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.566466093 CET49739443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.568713903 CET49739443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.568747997 CET44349739142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.571099043 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.582099915 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.582285881 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.587621927 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.998364925 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.998437881 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.998873949 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.002940893 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.002974987 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.012455940 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.012562037 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.012877941 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.014022112 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.014060974 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.020060062 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.020085096 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.020804882 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.021030903 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.021054983 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.189656019 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.230660915 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.533422947 CET4974480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.538789034 CET804974434.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.539187908 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.539223909 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.539324999 CET4974480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.539630890 CET4974480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.544950008 CET804974434.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.545566082 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.545850992 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.545866013 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.548377037 CET44349739142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.548571110 CET44349738142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.548592091 CET44349738142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.548625946 CET49739443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.549813032 CET44349739142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.549833059 CET44349738142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.550362110 CET49738443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.550374031 CET44349738142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.550375938 CET49739443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.558636904 CET49739443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.558681011 CET44349739142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.558743954 CET49739443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.559283972 CET44349739142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.561691046 CET49738443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.561706066 CET44349738142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.561827898 CET49738443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.562114954 CET44349738142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.562241077 CET49747443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.562258959 CET44349747142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.568536043 CET49739443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.568552971 CET49738443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.568615913 CET49747443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.569885015 CET49747443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.569905996 CET44349747142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.617408037 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.626415968 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.626502991 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.631892920 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.634815931 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.634833097 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.634949923 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.634973049 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.634979963 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.635437965 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.635453939 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.636651039 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.636651039 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.638588905 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.638602018 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.640736103 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.640780926 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.640873909 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.641156912 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.641216993 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.641302109 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.641377926 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.643309116 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.643352032 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.643426895 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.666261911 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.669730902 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.672377110 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.672389984 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.672852039 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.674328089 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.674397945 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.674510002 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.685290098 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.685317993 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.870218039 CET49747443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.870232105 CET44349747142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.138462067 CET804974434.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.172465086 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.172519922 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.175123930 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.175132036 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.175652027 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.177166939 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.177261114 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.177344084 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.177942991 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.186531067 CET4974480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.256520033 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.256624937 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.259610891 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.259728909 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.261549950 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.261583090 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.261629105 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.261848927 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.262574911 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.263171911 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.263189077 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.263231039 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.263326883 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.263394117 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.286691904 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.286717892 CET4974480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.292538881 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.292843103 CET804974434.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.294157028 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.294167042 CET4974480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.427958965 CET44349747142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.429303885 CET44349747142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.432766914 CET49747443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.432780981 CET44349747142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.436961889 CET49747443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.436971903 CET44349747142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.437087059 CET49747443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.437216997 CET44349747142.250.184.206192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.437316895 CET49747443192.168.2.4142.250.184.206
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.851558924 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.851632118 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.857124090 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.858534098 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.858562946 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.862828016 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.869214058 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.870099068 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.870273113 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.877903938 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.467422962 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.482790947 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.482886076 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.487520933 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.487538099 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.487631083 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.488009930 CET49753443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.488038063 CET4434975334.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.488204956 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.489016056 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.489027977 CET49753443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.490361929 CET49753443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.490375996 CET4434975334.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.508378983 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.054354906 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.152659893 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.152817965 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.162278891 CET4434975334.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.162769079 CET49753443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.167877913 CET49753443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.167884111 CET4434975334.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.167980909 CET49753443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.168427944 CET4434975334.117.188.166192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.179838896 CET49753443192.168.2.434.117.188.166
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.311883926 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.317780018 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.317934036 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.318090916 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.323508024 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.944721937 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.997004986 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:34.066081047 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:34.071540117 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:34.079989910 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:37.143198013 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:37.148852110 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:37.277612925 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:37.322500944 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:39.253035069 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:39.259006023 CET804975434.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:39.259084940 CET4975480192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.007033110 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.014110088 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.142947912 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.189634085 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.587851048 CET49763443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.587882996 CET4434976334.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.588270903 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.591727018 CET49763443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.593628883 CET49763443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.593646049 CET4434976334.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.595535994 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.715116024 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.762965918 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.161623001 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.167203903 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.215014935 CET4434976334.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.215579033 CET49763443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.220237017 CET49763443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.220246077 CET4434976334.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.220293999 CET49763443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.220513105 CET4434976334.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.221103907 CET49763443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.293185949 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.349081993 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.353346109 CET49764443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.353418112 CET4434976435.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.353821993 CET49764443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.353992939 CET49764443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.354028940 CET4434976435.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.356609106 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.356697083 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.357105017 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.358490944 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.358539104 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.373408079 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.379308939 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.499130011 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.549621105 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.876672983 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.882210970 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.906104088 CET49766443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.906188011 CET4434976634.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.906290054 CET49766443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.908206940 CET49766443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.908241987 CET4434976634.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.968267918 CET4434976435.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.968447924 CET49764443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.972716093 CET49764443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.972740889 CET4434976435.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.973146915 CET4434976435.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.974306107 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.974500895 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.979367018 CET49764443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.979484081 CET49764443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.979585886 CET4434976435.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.980020046 CET49764443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.981601954 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.981654882 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.981682062 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.981888056 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.982271910 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.008143902 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.044881105 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.050281048 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.051093102 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.099263906 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.099340916 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.099695921 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.101653099 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.101684093 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.170139074 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.213893890 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.522856951 CET4434976634.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.522948027 CET49766443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.717305899 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.717397928 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.946384907 CET49766443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.946455956 CET4434976634.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.946510077 CET49766443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.946670055 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.946715117 CET4434976634.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.946724892 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.946758032 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.947015047 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.947774887 CET49766443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.947789907 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.956955910 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.962414980 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.975692987 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.981185913 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.985208035 CET49768443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.985286951 CET4434976834.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.986895084 CET49768443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.988806963 CET49768443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.988842010 CET4434976834.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.990456104 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.990484953 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.991236925 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.991408110 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.991424084 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.994247913 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.994271994 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.994950056 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.995096922 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.995132923 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.088327885 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.100625038 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.132246017 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.154386997 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.165210009 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.170613050 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.297360897 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.355014086 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.598028898 CET4434976834.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.598120928 CET49768443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.605057001 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.611331940 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.612140894 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.644551992 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.644704103 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.677160025 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.677229881 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.678152084 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.680524111 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.680560112 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.680830956 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.687686920 CET49768443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.687701941 CET4434976834.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.688014984 CET49768443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.688025951 CET4434976834.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.688040972 CET4434976834.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.688146114 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.688247919 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.688846111 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.690160036 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.690193892 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.737019062 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.899338007 CET4434976834.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:46.899420977 CET49768443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.600220919 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.600294113 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.600478888 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.601382017 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.615631104 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.621146917 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.741354942 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.793459892 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.945744038 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.951190948 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:48.078214884 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:48.118176937 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.443589926 CET49771443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.443675041 CET4434977134.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.444489002 CET49771443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.446552992 CET49771443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.446589947 CET4434977134.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.055583954 CET4434977134.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.055732965 CET49771443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.061647892 CET49771443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.061659098 CET4434977134.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.061741114 CET49771443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.061805010 CET4434977134.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.065023899 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.065562963 CET49771443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.070441008 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.193162918 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.196868896 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.205185890 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.240600109 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.330950022 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.372149944 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.819714069 CET49772443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.819749117 CET4434977235.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.824645042 CET49772443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.824645042 CET49772443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.824676991 CET4434977235.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.843064070 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.843103886 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.843780994 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.843780994 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.843821049 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.849513054 CET49774443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.849550962 CET4434977435.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.852489948 CET49774443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.858608007 CET49774443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.858648062 CET4434977435.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.860619068 CET49775443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.860673904 CET44349775151.101.1.91192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.867197037 CET49775443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.873105049 CET49776443192.168.2.435.201.103.21
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.873105049 CET49775443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.873117924 CET4434977635.201.103.21192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.873140097 CET44349775151.101.1.91192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.874361992 CET49776443192.168.2.435.201.103.21
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.875171900 CET49776443192.168.2.435.201.103.21
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.875184059 CET4434977635.201.103.21192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.432172060 CET4434977235.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.432378054 CET49772443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.435944080 CET49772443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.435956955 CET4434977235.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.436192036 CET4434977235.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.438174009 CET49772443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.438296080 CET49772443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.442576885 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.447918892 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.487493992 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.487588882 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.491353035 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.491364002 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.491684914 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.493412018 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.493596077 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.493628979 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.493635893 CET4434977334.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.494679928 CET49773443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.494987011 CET44349775151.101.1.91192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.495008945 CET44349775151.101.1.91192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.495145082 CET49775443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.496167898 CET4434977435.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.496471882 CET49774443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.497980118 CET49775443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.497991085 CET44349775151.101.1.91192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.498342991 CET44349775151.101.1.91192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.499738932 CET4434977635.201.103.21192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.499881983 CET49776443192.168.2.435.201.103.21
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.504329920 CET49775443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.504414082 CET49775443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.504597902 CET44349775151.101.1.91192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.504890919 CET49775443192.168.2.4151.101.1.91
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.506179094 CET49774443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.506186008 CET4434977435.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.506237030 CET49774443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.506346941 CET4434977435.190.72.216192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.506799936 CET49776443192.168.2.435.201.103.21
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.506803989 CET4434977635.201.103.21192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.506854057 CET49776443192.168.2.435.201.103.21
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.507062912 CET4434977635.201.103.21192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.511888027 CET49774443192.168.2.435.190.72.216
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.511904001 CET49776443192.168.2.435.201.103.21
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.512531996 CET49777443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.512556076 CET4434977735.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.512878895 CET49777443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.513019085 CET49777443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.513031960 CET4434977735.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.515197039 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.515243053 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.515882015 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.515979052 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.515995026 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.518142939 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.518151045 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.518776894 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.518899918 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.518910885 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.524437904 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.524458885 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.524581909 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.524665117 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.524679899 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.567306995 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.569972992 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.575340986 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.620791912 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.701260090 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.752475977 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.112303019 CET4434977735.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.112545967 CET49777443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.115417004 CET49777443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.115422964 CET4434977735.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.115740061 CET4434977735.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.117736101 CET49777443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.117831945 CET49777443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.117912054 CET4434977735.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.121917963 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.122250080 CET49777443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.319669008 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.321814060 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.321854115 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.321883917 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.322223902 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.324795008 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.324807882 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.325050116 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.326929092 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.326935053 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.327168941 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.327426910 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.328290939 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.330473900 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.330498934 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.330904007 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.331712008 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.331793070 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.331866026 CET4434978034.149.100.209192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.332067013 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.332117081 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.332197905 CET4434977935.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.333188057 CET49780443192.168.2.434.149.100.209
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.333201885 CET49779443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.334466934 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.334527969 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.334661007 CET4434977835.244.181.201192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.337290049 CET49778443192.168.2.435.244.181.201
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.439691067 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.442723989 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.448149920 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.492136002 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.573813915 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.623697996 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.067014933 CET49782443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.067095995 CET4434978234.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.067234993 CET49782443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.068456888 CET49782443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.068490028 CET4434978234.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.668454885 CET4434978234.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.668579102 CET49782443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.674626112 CET49782443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.674654961 CET4434978234.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.674762964 CET49782443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.674869061 CET4434978234.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.676150084 CET49782443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.677839041 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.683383942 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.803102016 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.809011936 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.814410925 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.848750114 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.940428972 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:01.002516985 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:10.818134069 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:10.949636936 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.425313950 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.425344944 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.442419052 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.447757006 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.568356991 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.571090937 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.576462030 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.620390892 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.702282906 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.751961946 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.022006035 CET49805443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.022087097 CET4434980534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.022198915 CET49805443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.023461103 CET49805443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.023530006 CET4434980534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.579824924 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.585445881 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.648968935 CET4434980534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.649169922 CET49805443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.654500961 CET49805443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.654529095 CET4434980534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.654594898 CET49805443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.654930115 CET4434980534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.654990911 CET49805443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.657094955 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.662452936 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.711412907 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.716967106 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.781843901 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.784805059 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.790203094 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.833364964 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.916026115 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.964909077 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794460058 CET49831443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794472933 CET49832443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794517994 CET4434983234.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794543028 CET4434983134.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794599056 CET49833443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794680119 CET4434983334.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794934988 CET49832443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794958115 CET49833443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.794965982 CET49831443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.795109034 CET49832443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.795123100 CET4434983234.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.795356035 CET49833443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.795387030 CET4434983334.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.795443058 CET49831443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.795470953 CET4434983134.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.404090881 CET4434983334.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.404275894 CET49833443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.407727003 CET49833443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.407759905 CET4434983334.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.408159018 CET4434983334.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.410372019 CET49833443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.410490036 CET49833443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.410547018 CET4434983334.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.410947084 CET4434983134.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.414110899 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.414915085 CET49833443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.415069103 CET4434983234.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.415101051 CET49831443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.418179989 CET49831443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.418232918 CET4434983134.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.418327093 CET49832443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.418955088 CET4434983134.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.420030117 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.420484066 CET49832443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.420501947 CET4434983234.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.420818090 CET4434983234.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.423578978 CET49831443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.423680067 CET49831443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.423965931 CET4434983134.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.424127102 CET49832443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.424197912 CET49832443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.424290895 CET4434983234.120.208.123192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.424330950 CET49831443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.424427032 CET49832443192.168.2.434.120.208.123
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.539937019 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.543704987 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.549818039 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.589179993 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.674926996 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.727366924 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:36.554886103 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:36.560285091 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:36.686605930 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:36.691936970 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:46.561789036 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:46.567193985 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:46.699974060 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:46.706346035 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:56.575238943 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:56.580643892 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:56.713351011 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:19:56.718683004 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.172492981 CET50034443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.172523022 CET4435003434.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.172719002 CET50034443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.174201012 CET50034443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.174213886 CET4435003434.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.818909883 CET4435003434.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.818981886 CET50034443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.825159073 CET50034443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.825167894 CET4435003434.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.825261116 CET50034443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.825443029 CET4435003434.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.825581074 CET50034443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.828007936 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.833311081 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.952857018 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.956254005 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.962673903 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:03.008223057 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:03.087656975 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:03.130667925 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:12.958302021 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:12.964005947 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:13.089934111 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:13.095453978 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:22.964767933 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:22.970249891 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:23.102933884 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:23.108481884 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:32.977890015 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:32.983669043 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:33.115958929 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:33.121540070 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:42.990883112 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:42.996458054 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:43.122462034 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:43.127985954 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:53.002794981 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:53.008394957 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:53.134355068 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:20:53.139811039 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:03.015889883 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:03.021513939 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:03.147669077 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:03.153243065 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:13.028582096 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:13.034097910 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:13.160506964 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:13.165941000 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.036180019 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.041611910 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.190030098 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.196065903 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.627214909 CET50055443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.627300978 CET4435005534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.627908945 CET50055443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.629287004 CET50055443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.629338026 CET4435005534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.278053045 CET4435005534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.287378073 CET4435005534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.297573090 CET50055443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.302666903 CET50055443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.302717924 CET4435005534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.303426027 CET4435005534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.303997993 CET50055443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.304052114 CET4435005534.107.243.93192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.305608034 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.310975075 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.318015099 CET50055443192.168.2.434.107.243.93
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.430455923 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.434818983 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.440455914 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.479120970 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.566904068 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.619976044 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.092638969 CET5164753192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.100264072 CET53516471.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.148118019 CET5698453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.155925035 CET53569841.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.439013004 CET6361653192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.445327044 CET5143753192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.446330070 CET53636161.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.447663069 CET5493553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.454816103 CET53549351.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.458277941 CET5400353192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.459212065 CET6541453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.465401888 CET53540031.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.468318939 CET53654141.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.468657017 CET5343453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.476867914 CET53534341.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.987163067 CET5412953192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.995096922 CET53541291.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.999043941 CET5438153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.002677917 CET5604053192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.006567001 CET53543811.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.010163069 CET53560401.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.011791945 CET6212753192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.012545109 CET5613053192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.019104958 CET53621271.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.020365000 CET53561301.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.020680904 CET6036753192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.021461964 CET5186953192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.028027058 CET53603671.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.029613972 CET53518691.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.030626059 CET6149153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.037754059 CET53614911.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.337388039 CET5358453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.338044882 CET6330453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.344540119 CET6356653192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.346242905 CET5301553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529608965 CET53633041.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529839993 CET53530151.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529860973 CET53535841.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.542649984 CET5252553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.551016092 CET53525251.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.565473080 CET5792253192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.573465109 CET53579221.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.611571074 CET5695053192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.619538069 CET53569501.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.621016026 CET6360453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.628932953 CET53636041.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.630090952 CET6109153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.638145924 CET53610911.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:40.943782091 CET6141653192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:40.972446918 CET53613261.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.405497074 CET5568153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.412781000 CET53556811.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.413999081 CET6291153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.421125889 CET53629111.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.421643972 CET6030553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.429541111 CET53603051.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.587910891 CET4950153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.589051008 CET5979353192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.599224091 CET53597931.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.339975119 CET6267153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.347754002 CET53626711.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.357031107 CET5607153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.364197969 CET53560711.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.370434999 CET6382353192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.381334066 CET53638231.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.894093037 CET6437253192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.901870012 CET53643721.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.906588078 CET5106153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.914375067 CET53510611.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.915707111 CET5800453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.922991991 CET53580041.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.343377113 CET6082753192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.350951910 CET53608271.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.987711906 CET5927253192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.987824917 CET6401253192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.988146067 CET5545753192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET53592721.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995368958 CET53640121.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995944977 CET53554571.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.996227026 CET6503653192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.996314049 CET5831953192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.996995926 CET5827853192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003659010 CET53650361.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET53583191.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.006561995 CET5522153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.006669998 CET5559853192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.010746002 CET53582781.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.011234045 CET5202453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014048100 CET53555981.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014082909 CET53552211.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014664888 CET6282453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.015016079 CET5289753192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.019058943 CET53520241.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.021848917 CET53628241.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.022047043 CET53528971.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.022573948 CET5863553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.022751093 CET6386253192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.029752016 CET53586351.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.031028986 CET53638621.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.031996012 CET5338653192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.032121897 CET5851753192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.039458036 CET53533861.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.039701939 CET53585171.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.819719076 CET6205553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.827800035 CET53620551.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.842951059 CET5049353192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.850895882 CET53504931.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.852487087 CET5160153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.855377913 CET6511653192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.860382080 CET53516011.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.863441944 CET53651161.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.867197990 CET5057553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.867621899 CET6319653192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.875128984 CET53505751.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.875159025 CET53631961.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.884736061 CET5707353192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.892676115 CET53570731.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.066354990 CET4949553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.074044943 CET53494951.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.075011015 CET5123153192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.082314968 CET53512311.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.013071060 CET6408253192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.020828009 CET53640821.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.021568060 CET5615953192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.028742075 CET53561591.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.753961086 CET5459053192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.761200905 CET53545901.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.164278984 CET6531853192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.171591997 CET53653181.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.172494888 CET5358553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.179826975 CET53535851.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.828201056 CET6112053192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.581188917 CET5232453192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.588628054 CET53523241.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.590768099 CET4946553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.598225117 CET53494651.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.623579025 CET4946553192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.623975992 CET5207653192.168.2.41.1.1.1
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.630852938 CET53494651.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.631858110 CET53520761.1.1.1192.168.2.4
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.306407928 CET5444853192.168.2.41.1.1.1
                                                                                                                                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.092638969 CET192.168.2.41.1.1.10x31bdStandard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.148118019 CET192.168.2.41.1.1.10x2d3cStandard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.439013004 CET192.168.2.41.1.1.10xfa8bStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.445327044 CET192.168.2.41.1.1.10x3d25Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.447663069 CET192.168.2.41.1.1.10x90b1Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.458277941 CET192.168.2.41.1.1.10xac76Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.459212065 CET192.168.2.41.1.1.10xbe0dStandard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.468657017 CET192.168.2.41.1.1.10xfc53Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.987163067 CET192.168.2.41.1.1.10x6e5eStandard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.999043941 CET192.168.2.41.1.1.10xae7eStandard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.002677917 CET192.168.2.41.1.1.10x22aeStandard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.011791945 CET192.168.2.41.1.1.10x9c7Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.012545109 CET192.168.2.41.1.1.10x71dfStandard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.020680904 CET192.168.2.41.1.1.10xd052Standard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.021461964 CET192.168.2.41.1.1.10x5d27Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.030626059 CET192.168.2.41.1.1.10x9d35Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.337388039 CET192.168.2.41.1.1.10x660eStandard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.338044882 CET192.168.2.41.1.1.10xdafdStandard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.344540119 CET192.168.2.41.1.1.10x5ce5Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.346242905 CET192.168.2.41.1.1.10xd529Standard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.542649984 CET192.168.2.41.1.1.10xa3f7Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.565473080 CET192.168.2.41.1.1.10xcd60Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.611571074 CET192.168.2.41.1.1.10x9986Standard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.621016026 CET192.168.2.41.1.1.10xd96Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.630090952 CET192.168.2.41.1.1.10x603cStandard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:40.943782091 CET192.168.2.41.1.1.10xab34Standard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.405497074 CET192.168.2.41.1.1.10x5d25Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.413999081 CET192.168.2.41.1.1.10xd0b1Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.421643972 CET192.168.2.41.1.1.10xc3adStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.587910891 CET192.168.2.41.1.1.10x6a5bStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.589051008 CET192.168.2.41.1.1.10xf3aaStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.339975119 CET192.168.2.41.1.1.10x2602Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.357031107 CET192.168.2.41.1.1.10x7425Standard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.370434999 CET192.168.2.41.1.1.10xc3a8Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.894093037 CET192.168.2.41.1.1.10x173bStandard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.906588078 CET192.168.2.41.1.1.10xe043Standard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.915707111 CET192.168.2.41.1.1.10x391cStandard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.343377113 CET192.168.2.41.1.1.10x986fStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.987711906 CET192.168.2.41.1.1.10xd304Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.987824917 CET192.168.2.41.1.1.10xe0f2Standard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.988146067 CET192.168.2.41.1.1.10xca24Standard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.996227026 CET192.168.2.41.1.1.10x90d9Standard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.996314049 CET192.168.2.41.1.1.10x51e5Standard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.996995926 CET192.168.2.41.1.1.10xa26dStandard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.006561995 CET192.168.2.41.1.1.10x77b0Standard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.006669998 CET192.168.2.41.1.1.10x3f61Standard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.011234045 CET192.168.2.41.1.1.10xdeb3Standard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014664888 CET192.168.2.41.1.1.10x80a1Standard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.015016079 CET192.168.2.41.1.1.10x1e85Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.022573948 CET192.168.2.41.1.1.10xee12Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.022751093 CET192.168.2.41.1.1.10xf83Standard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.031996012 CET192.168.2.41.1.1.10x548aStandard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.032121897 CET192.168.2.41.1.1.10x7652Standard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.819719076 CET192.168.2.41.1.1.10x928Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.842951059 CET192.168.2.41.1.1.10x42a8Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.852487087 CET192.168.2.41.1.1.10xa009Standard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.855377913 CET192.168.2.41.1.1.10xab34Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.867197990 CET192.168.2.41.1.1.10x3f16Standard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.867621899 CET192.168.2.41.1.1.10xb5b8Standard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.884736061 CET192.168.2.41.1.1.10x5b5fStandard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.066354990 CET192.168.2.41.1.1.10xfbacStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.075011015 CET192.168.2.41.1.1.10xb138Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.013071060 CET192.168.2.41.1.1.10xc2aeStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.021568060 CET192.168.2.41.1.1.10x9093Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.753961086 CET192.168.2.41.1.1.10x656fStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.164278984 CET192.168.2.41.1.1.10xfdfcStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.172494888 CET192.168.2.41.1.1.10x20c2Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.828201056 CET192.168.2.41.1.1.10x9856Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.581188917 CET192.168.2.41.1.1.10x5b9dStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.590768099 CET192.168.2.41.1.1.10x13c1Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.623579025 CET192.168.2.41.1.1.10x13c1Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.623975992 CET192.168.2.41.1.1.10x2796Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.306407928 CET192.168.2.41.1.1.10xd1f7Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.053087950 CET1.1.1.1192.168.2.40xd74bNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:27.100264072 CET1.1.1.1192.168.2.40x31bdNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.446330070 CET1.1.1.1192.168.2.40xfa8bNo error (0)youtube.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.453136921 CET1.1.1.1192.168.2.40x3d25No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.453136921 CET1.1.1.1192.168.2.40x3d25No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.454816103 CET1.1.1.1192.168.2.40x90b1No error (0)youtube.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.465401888 CET1.1.1.1192.168.2.40xac76No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.468318939 CET1.1.1.1192.168.2.40xbe0dNo error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.476867914 CET1.1.1.1192.168.2.40xfc53No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.995096922 CET1.1.1.1192.168.2.40x6e5eNo error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.006567001 CET1.1.1.1192.168.2.40xae7eNo error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.010163069 CET1.1.1.1192.168.2.40x22aeNo error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.010163069 CET1.1.1.1192.168.2.40x22aeNo error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.014919043 CET1.1.1.1192.168.2.40x62e9No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.014919043 CET1.1.1.1192.168.2.40x62e9No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.020365000 CET1.1.1.1192.168.2.40x71dfNo error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.028027058 CET1.1.1.1192.168.2.40xd052No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529608965 CET1.1.1.1192.168.2.40xdafdNo error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529608965 CET1.1.1.1192.168.2.40xdafdNo error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529655933 CET1.1.1.1192.168.2.40x5ce5No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529655933 CET1.1.1.1192.168.2.40x5ce5No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529839993 CET1.1.1.1192.168.2.40xd529No error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529839993 CET1.1.1.1192.168.2.40xd529No error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529839993 CET1.1.1.1192.168.2.40xd529No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.529860973 CET1.1.1.1192.168.2.40x660eNo error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.551016092 CET1.1.1.1192.168.2.40xa3f7No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.573465109 CET1.1.1.1192.168.2.40xcd60No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.619538069 CET1.1.1.1192.168.2.40x9986No error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.619538069 CET1.1.1.1192.168.2.40x9986No error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.619538069 CET1.1.1.1192.168.2.40x9986No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:36.628932953 CET1.1.1.1192.168.2.40xd96No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:40.951793909 CET1.1.1.1192.168.2.40xab34No error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.412781000 CET1.1.1.1192.168.2.40x5d25No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.421125889 CET1.1.1.1192.168.2.40xd0b1No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.598432064 CET1.1.1.1192.168.2.40x6a5bNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.598432064 CET1.1.1.1192.168.2.40x6a5bNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.599224091 CET1.1.1.1192.168.2.40xf3aaNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.346697092 CET1.1.1.1192.168.2.40xe638No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.346697092 CET1.1.1.1192.168.2.40xe638No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.351380110 CET1.1.1.1192.168.2.40x7bf3No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.364197969 CET1.1.1.1192.168.2.40x7425No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.901870012 CET1.1.1.1192.168.2.40x173bNo error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.901870012 CET1.1.1.1192.168.2.40x173bNo error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.914375067 CET1.1.1.1192.168.2.40xe043No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.095021009 CET1.1.1.1192.168.2.40x15a3No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995277882 CET1.1.1.1192.168.2.40xd304No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995368958 CET1.1.1.1192.168.2.40xe0f2No error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995368958 CET1.1.1.1192.168.2.40xe0f2No error (0)star-mini.c10r.facebook.com157.240.253.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995944977 CET1.1.1.1192.168.2.40xca24No error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:49.995944977 CET1.1.1.1192.168.2.40xca24No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003659010 CET1.1.1.1192.168.2.40x90d9No error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.003997087 CET1.1.1.1192.168.2.40x51e5No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.010746002 CET1.1.1.1192.168.2.40xa26dNo error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014048100 CET1.1.1.1192.168.2.40x3f61No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014048100 CET1.1.1.1192.168.2.40x3f61No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014048100 CET1.1.1.1192.168.2.40x3f61No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014048100 CET1.1.1.1192.168.2.40x3f61No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.014082909 CET1.1.1.1192.168.2.40x77b0No error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.019058943 CET1.1.1.1192.168.2.40xdeb3No error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.021848917 CET1.1.1.1192.168.2.40x80a1No error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.021848917 CET1.1.1.1192.168.2.40x80a1No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.021848917 CET1.1.1.1192.168.2.40x80a1No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.021848917 CET1.1.1.1192.168.2.40x80a1No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.021848917 CET1.1.1.1192.168.2.40x80a1No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.022047043 CET1.1.1.1192.168.2.40x1e85No error (0)twitter.com104.244.42.129A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.029752016 CET1.1.1.1192.168.2.40xee12No error (0)twitter.com104.244.42.129A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.031028986 CET1.1.1.1192.168.2.40xf83No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.031028986 CET1.1.1.1192.168.2.40xf83No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.031028986 CET1.1.1.1192.168.2.40xf83No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.031028986 CET1.1.1.1192.168.2.40xf83No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.850895882 CET1.1.1.1192.168.2.40x42a8No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.850895882 CET1.1.1.1192.168.2.40x42a8No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.850895882 CET1.1.1.1192.168.2.40x42a8No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.850895882 CET1.1.1.1192.168.2.40x42a8No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.860382080 CET1.1.1.1192.168.2.40xa009No error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.860382080 CET1.1.1.1192.168.2.40xa009No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.863441944 CET1.1.1.1192.168.2.40xab34No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.863441944 CET1.1.1.1192.168.2.40xab34No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.863441944 CET1.1.1.1192.168.2.40xab34No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.863441944 CET1.1.1.1192.168.2.40xab34No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:55.875128984 CET1.1.1.1192.168.2.40x3f16No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.349270105 CET1.1.1.1192.168.2.40xb6f7No error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.349270105 CET1.1.1.1192.168.2.40xb6f7No error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.074044943 CET1.1.1.1192.168.2.40xfbacNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.020828009 CET1.1.1.1192.168.2.40xc2aeNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:19:25.760802031 CET1.1.1.1192.168.2.40x475No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.171591997 CET1.1.1.1192.168.2.40xfdfcNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.835391045 CET1.1.1.1192.168.2.40x9856No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.835391045 CET1.1.1.1192.168.2.40x9856No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.588628054 CET1.1.1.1192.168.2.40x5b9dNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.598225117 CET1.1.1.1192.168.2.40x13c1No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:23.630852938 CET1.1.1.1192.168.2.40x13c1No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.313587904 CET1.1.1.1192.168.2.40xd1f7No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.313587904 CET1.1.1.1192.168.2.40xd1f7No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                • detectportal.firefox.com
                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                0192.168.2.44974034.107.221.82807712C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                Oct 28, 2024 02:18:29.582285881 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.189656019 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36825
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                1192.168.2.44974434.107.221.82807712C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                Oct 28, 2024 02:18:30.539630890 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.138462067 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50844
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success


                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                2192.168.2.44975234.107.221.82807712C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                Oct 28, 2024 02:18:31.870273113 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:32.467422962 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36827
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:37.143198013 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:37.277612925 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36832
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.588270903 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:42.715116024 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36837
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.373408079 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.499130011 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36838
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.044881105 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.170139074 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36839
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.975692987 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.100625038 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36840
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.615631104 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.741354942 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36842
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.065023899 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.193162918 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36845
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.442576885 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.567306995 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36851
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.121917963 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.439691067 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36852
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.677839041 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.803102016 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36855
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:19:10.818134069 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.442419052 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.568356991 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36866
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.579824924 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.657094955 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.781843901 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36876
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.414110899 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.539937019 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36881
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:19:36.554886103 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:19:46.561789036 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:19:56.575238943 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.828007936 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.952857018 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36917
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                Oct 28, 2024 02:20:12.958302021 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:22.964767933 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:32.977890015 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:42.990883112 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:53.002794981 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.305608034 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.430455923 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 15:04:45 GMT
                                                                                                                                                                                                                                Age: 36999
                                                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                3192.168.2.44975534.107.221.82807712C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.318090916 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:33.944721937 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50846
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.007033110 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:41.142947912 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50854
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.161623001 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.293185949 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50856
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:43.876672983 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.008143902 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50856
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:44.956955910 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.088327885 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50858
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.165210009 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:45.297360897 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50858
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:47.945744038 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:48.078214884 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50861
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.196868896 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:50.330950022 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50863
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.569972992 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:56.701260090 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50869
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.442723989 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:18:57.573813915 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50870
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.809011936 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:19:00.940428972 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50873
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:19:10.949636936 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.571090937 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:19:11.702282906 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50884
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.711412907 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.784805059 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:19:21.916026115 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50894
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.543704987 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:19:26.674926996 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50899
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:19:36.686605930 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:19:46.699974060 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:19:56.713351011 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:02.956254005 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:20:03.087656975 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 50936
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                                                Oct 28, 2024 02:20:13.089934111 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:23.102933884 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:33.115958929 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:43.122462034 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:20:53.134355068 CET6OUTData Raw: 00
                                                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.434818983 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                                                Oct 28, 2024 02:21:24.566904068 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                                                Date: Sun, 27 Oct 2024 11:11:07 GMT
                                                                                                                                                                                                                                Age: 51017
                                                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                Data Ascii: success


                                                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                                                Click to dive into process behavior distribution

                                                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                                                Target ID:0
                                                                                                                                                                                                                                Start time:21:18:20
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                                Imagebase:0x510000
                                                                                                                                                                                                                                File size:919'552 bytes
                                                                                                                                                                                                                                MD5 hash:158A88B989303EB0443DB400EEA08E23
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Yara matches:
                                                                                                                                                                                                                                • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000003.1749194237.0000000000DAF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000003.1749451115.0000000000DB6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                Reputation:low
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:1
                                                                                                                                                                                                                                Start time:21:18:20
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                                Imagebase:0xd0000
                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:2
                                                                                                                                                                                                                                Start time:21:18:20
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:3
                                                                                                                                                                                                                                Start time:21:18:22
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                                Imagebase:0xd0000
                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:4
                                                                                                                                                                                                                                Start time:21:18:22
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:5
                                                                                                                                                                                                                                Start time:21:18:22
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                                Imagebase:0xd0000
                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:6
                                                                                                                                                                                                                                Start time:21:18:22
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:7
                                                                                                                                                                                                                                Start time:21:18:22
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                                Imagebase:0xd0000
                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:8
                                                                                                                                                                                                                                Start time:21:18:22
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                Imagebase:0x800000
                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:9
                                                                                                                                                                                                                                Start time:21:18:23
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                                                Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                                Imagebase:0xd0000
                                                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:10
                                                                                                                                                                                                                                Start time:21:18:23
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:11
                                                                                                                                                                                                                                Start time:21:18:23
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:12
                                                                                                                                                                                                                                Start time:21:18:23
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                                                Target ID:13
                                                                                                                                                                                                                                Start time:21:18:23
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                                                Target ID:15
                                                                                                                                                                                                                                Start time:21:18:24
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4545e727-0c1a-4468-96bf-5b74738a9406} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 2410036fd10 socket
                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                                                Target ID:16
                                                                                                                                                                                                                                Start time:21:18:26
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3572 -parentBuildID 20230927232528 -prefsHandle 4496 -prefMapHandle 4492 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {11f93443-0807-4a81-8b55-bb39ff0fc5bb} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 24110c63e10 rdd
                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                                                Target ID:20
                                                                                                                                                                                                                                Start time:21:18:42
                                                                                                                                                                                                                                Start date:27/10/2024
                                                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5160 -prefMapHandle 5156 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b805f6f-7f96-4d47-a250-29f74ce1fae6} 7712 "\\.\pipe\gecko-crash-server-pipe.7712" 24100371b10 utility
                                                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                                                Reset < >

                                                                                                                                                                                                                                  Execution Graph

                                                                                                                                                                                                                                  Execution Coverage:2.1%
                                                                                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                  Signature Coverage:6.9%
                                                                                                                                                                                                                                  Total number of Nodes:1583
                                                                                                                                                                                                                                  Total number of Limit Nodes:56
                                                                                                                                                                                                                                  execution_graph 94320 511033 94325 514c91 94320->94325 94324 511042 94333 51a961 94325->94333 94330 514d9c 94331 511038 94330->94331 94341 5151f7 22 API calls __fread_nolock 94330->94341 94332 5300a3 29 API calls __onexit 94331->94332 94332->94324 94342 52fe0b 94333->94342 94335 51a976 94352 52fddb 94335->94352 94337 514cff 94338 513af0 94337->94338 94377 513b1c 94338->94377 94341->94330 94344 52fddb 94342->94344 94345 52fdfa 94344->94345 94348 52fdfc 94344->94348 94362 53ea0c 94344->94362 94369 534ead 7 API calls 2 library calls 94344->94369 94345->94335 94347 53066d 94371 5332a4 RaiseException 94347->94371 94348->94347 94370 5332a4 RaiseException 94348->94370 94351 53068a 94351->94335 94354 52fde0 94352->94354 94353 53ea0c ___std_exception_copy 21 API calls 94353->94354 94354->94353 94355 52fdfa 94354->94355 94357 52fdfc 94354->94357 94374 534ead 7 API calls 2 library calls 94354->94374 94355->94337 94358 53066d 94357->94358 94375 5332a4 RaiseException 94357->94375 94376 5332a4 RaiseException 94358->94376 94361 53068a 94361->94337 94367 543820 BuildCatchObjectHelperInternal 94362->94367 94363 54385e 94373 53f2d9 20 API calls __dosmaperr 94363->94373 94365 543849 RtlAllocateHeap 94366 54385c 94365->94366 94365->94367 94366->94344 94367->94363 94367->94365 94372 534ead 7 API calls 2 library calls 94367->94372 94369->94344 94370->94347 94371->94351 94372->94367 94373->94366 94374->94354 94375->94358 94376->94361 94378 513b0f 94377->94378 94379 513b29 94377->94379 94378->94330 94379->94378 94380 513b30 RegOpenKeyExW 94379->94380 94380->94378 94381 513b4a RegQueryValueExW 94380->94381 94382 513b80 RegCloseKey 94381->94382 94383 513b6b 94381->94383 94382->94378 94383->94382 94384 563f75 94395 52ceb1 94384->94395 94386 563f8b 94394 564006 94386->94394 94462 52e300 23 API calls 94386->94462 94389 564052 94392 564a88 94389->94392 94464 58359c 82 API calls __wsopen_s 94389->94464 94391 563fe6 94391->94389 94463 581abf 22 API calls 94391->94463 94404 51bf40 94394->94404 94396 52ced2 94395->94396 94397 52cebf 94395->94397 94398 52ced7 94396->94398 94399 52cf05 94396->94399 94465 51aceb 94397->94465 94401 52fddb 22 API calls 94398->94401 94402 51aceb 23 API calls 94399->94402 94403 52cec9 94401->94403 94402->94403 94403->94386 94477 51adf0 94404->94477 94406 51bf9d 94407 5604b6 94406->94407 94408 51bfa9 94406->94408 94495 58359c 82 API calls __wsopen_s 94407->94495 94409 5604c6 94408->94409 94410 51c01e 94408->94410 94496 58359c 82 API calls __wsopen_s 94409->94496 94482 51ac91 94410->94482 94414 5604f5 94432 56055a 94414->94432 94497 52d217 348 API calls 94414->94497 94415 51c7da 94420 52fe0b 22 API calls 94415->94420 94416 577120 22 API calls 94424 51c039 ISource __fread_nolock 94416->94424 94425 51c808 __fread_nolock 94420->94425 94424->94414 94424->94415 94424->94416 94424->94425 94426 51af8a 22 API calls 94424->94426 94427 56091a 94424->94427 94429 52fddb 22 API calls 94424->94429 94424->94432 94433 51ec40 348 API calls 94424->94433 94434 5608a5 94424->94434 94438 560591 94424->94438 94439 5608f6 94424->94439 94444 51c237 94424->94444 94445 51aceb 23 API calls 94424->94445 94447 52fe0b 22 API calls 94424->94447 94449 51c603 94424->94449 94455 5609bf 94424->94455 94458 51bbe0 40 API calls 94424->94458 94486 51ad81 94424->94486 94500 577099 22 API calls __fread_nolock 94424->94500 94501 595745 54 API calls _wcslen 94424->94501 94502 52aa42 22 API calls ISource 94424->94502 94503 57f05c 40 API calls 94424->94503 94504 51a993 41 API calls 94424->94504 94428 52fe0b 22 API calls 94425->94428 94426->94424 94531 583209 23 API calls 94427->94531 94460 51c350 ISource __fread_nolock 94428->94460 94429->94424 94432->94449 94498 58359c 82 API calls __wsopen_s 94432->94498 94433->94424 94505 51ec40 94434->94505 94437 5608cf 94437->94449 94529 51a81b 41 API calls 94437->94529 94499 58359c 82 API calls __wsopen_s 94438->94499 94530 58359c 82 API calls __wsopen_s 94439->94530 94446 51c253 94444->94446 94532 51a8c7 22 API calls __fread_nolock 94444->94532 94445->94424 94450 560976 94446->94450 94453 51c297 ISource 94446->94453 94447->94424 94449->94389 94452 51aceb 23 API calls 94450->94452 94452->94455 94454 51aceb 23 API calls 94453->94454 94453->94455 94456 51c335 94454->94456 94455->94449 94533 58359c 82 API calls __wsopen_s 94455->94533 94456->94455 94457 51c342 94456->94457 94493 51a704 22 API calls ISource 94457->94493 94458->94424 94461 51c3ac 94460->94461 94494 52ce17 22 API calls ISource 94460->94494 94461->94389 94462->94391 94463->94394 94464->94392 94466 51acf9 94465->94466 94474 51ad2a ISource 94465->94474 94467 51ad55 94466->94467 94469 51ad01 ISource 94466->94469 94467->94474 94475 51a8c7 22 API calls __fread_nolock 94467->94475 94470 51ad21 94469->94470 94471 55fa48 94469->94471 94469->94474 94472 55fa3a VariantClear 94470->94472 94470->94474 94471->94474 94476 52ce17 22 API calls ISource 94471->94476 94472->94474 94474->94403 94475->94474 94476->94474 94478 51ae01 94477->94478 94481 51ae1c ISource 94477->94481 94534 51aec9 94478->94534 94480 51ae09 CharUpperBuffW 94480->94481 94481->94406 94483 51acae 94482->94483 94484 51acd1 94483->94484 94540 58359c 82 API calls __wsopen_s 94483->94540 94484->94424 94487 51ad92 94486->94487 94488 55fadb 94486->94488 94489 52fddb 22 API calls 94487->94489 94490 51ad99 94489->94490 94541 51adcd 94490->94541 94493->94460 94494->94460 94495->94409 94496->94449 94497->94432 94498->94449 94499->94449 94500->94424 94501->94424 94502->94424 94503->94424 94504->94424 94527 51ec76 ISource 94505->94527 94506 530242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94506->94527 94507 5300a3 29 API calls pre_c_initialization 94507->94527 94508 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94508->94527 94509 52fddb 22 API calls 94509->94527 94510 51fef7 94523 51ed9d ISource 94510->94523 94552 51a8c7 22 API calls __fread_nolock 94510->94552 94513 564b0b 94554 58359c 82 API calls __wsopen_s 94513->94554 94514 51a8c7 22 API calls 94514->94527 94515 564600 94515->94523 94551 51a8c7 22 API calls __fread_nolock 94515->94551 94521 51fbe3 94521->94523 94524 564bdc 94521->94524 94528 51f3ae ISource 94521->94528 94522 51a961 22 API calls 94522->94527 94523->94437 94555 58359c 82 API calls __wsopen_s 94524->94555 94526 564beb 94556 58359c 82 API calls __wsopen_s 94526->94556 94527->94506 94527->94507 94527->94508 94527->94509 94527->94510 94527->94513 94527->94514 94527->94515 94527->94521 94527->94522 94527->94523 94527->94526 94527->94528 94549 5201e0 348 API calls 2 library calls 94527->94549 94550 5206a0 41 API calls ISource 94527->94550 94528->94523 94553 58359c 82 API calls __wsopen_s 94528->94553 94529->94439 94530->94449 94531->94444 94532->94446 94533->94449 94535 51aedc 94534->94535 94539 51aed9 __fread_nolock 94534->94539 94536 52fddb 22 API calls 94535->94536 94537 51aee7 94536->94537 94538 52fe0b 22 API calls 94537->94538 94538->94539 94539->94480 94540->94484 94544 51addd 94541->94544 94542 51adb6 94542->94424 94543 52fddb 22 API calls 94543->94544 94544->94542 94544->94543 94545 51a961 22 API calls 94544->94545 94547 51adcd 22 API calls 94544->94547 94548 51a8c7 22 API calls __fread_nolock 94544->94548 94545->94544 94547->94544 94548->94544 94549->94527 94550->94527 94551->94523 94552->94523 94553->94523 94554->94523 94555->94526 94556->94523 94557 512e37 94558 51a961 22 API calls 94557->94558 94559 512e4d 94558->94559 94636 514ae3 94559->94636 94561 512e6b 94650 513a5a 94561->94650 94563 512e7f 94657 519cb3 94563->94657 94568 552cb0 94703 582cf9 94568->94703 94569 512ead 94685 51a8c7 22 API calls __fread_nolock 94569->94685 94571 552cc3 94573 552ccf 94571->94573 94729 514f39 94571->94729 94577 514f39 68 API calls 94573->94577 94574 512ec3 94686 516f88 22 API calls 94574->94686 94579 552ce5 94577->94579 94578 512ecf 94580 519cb3 22 API calls 94578->94580 94735 513084 22 API calls 94579->94735 94581 512edc 94580->94581 94687 51a81b 41 API calls 94581->94687 94584 512eec 94586 519cb3 22 API calls 94584->94586 94585 552d02 94736 513084 22 API calls 94585->94736 94588 512f12 94586->94588 94688 51a81b 41 API calls 94588->94688 94589 552d1e 94591 513a5a 24 API calls 94589->94591 94593 552d44 94591->94593 94592 512f21 94596 51a961 22 API calls 94592->94596 94737 513084 22 API calls 94593->94737 94595 552d50 94738 51a8c7 22 API calls __fread_nolock 94595->94738 94598 512f3f 94596->94598 94689 513084 22 API calls 94598->94689 94599 552d5e 94739 513084 22 API calls 94599->94739 94602 512f4b 94690 534a28 40 API calls 2 library calls 94602->94690 94603 552d6d 94740 51a8c7 22 API calls __fread_nolock 94603->94740 94605 512f59 94605->94579 94606 512f63 94605->94606 94691 534a28 40 API calls 2 library calls 94606->94691 94609 552d83 94741 513084 22 API calls 94609->94741 94610 512f6e 94610->94585 94612 512f78 94610->94612 94692 534a28 40 API calls 2 library calls 94612->94692 94614 512f83 94614->94589 94615 512f8d 94614->94615 94693 534a28 40 API calls 2 library calls 94615->94693 94616 552d90 94618 512f98 94619 512fdc 94618->94619 94694 513084 22 API calls 94618->94694 94619->94603 94620 512fe8 94619->94620 94620->94616 94697 5163eb 22 API calls 94620->94697 94622 512fbf 94695 51a8c7 22 API calls __fread_nolock 94622->94695 94624 512ff8 94698 516a50 22 API calls 94624->94698 94627 512fcd 94696 513084 22 API calls 94627->94696 94628 513006 94699 5170b0 23 API calls 94628->94699 94633 513021 94634 513065 94633->94634 94700 516f88 22 API calls 94633->94700 94701 5170b0 23 API calls 94633->94701 94702 513084 22 API calls 94633->94702 94637 514af0 __wsopen_s 94636->94637 94639 514b22 94637->94639 94745 516b57 94637->94745 94645 514b58 94639->94645 94742 514c6d 94639->94742 94641 514c29 94642 519cb3 22 API calls 94641->94642 94649 514c5e 94641->94649 94644 514c52 94642->94644 94643 519cb3 22 API calls 94643->94645 94646 51515f 22 API calls 94644->94646 94645->94641 94645->94643 94647 514c6d 22 API calls 94645->94647 94757 51515f 94645->94757 94646->94649 94647->94645 94649->94561 94768 551f50 94650->94768 94653 519cb3 22 API calls 94654 513a8d 94653->94654 94770 513aa2 94654->94770 94656 513a97 94656->94563 94658 519cc2 _wcslen 94657->94658 94659 52fe0b 22 API calls 94658->94659 94660 519cea __fread_nolock 94659->94660 94661 52fddb 22 API calls 94660->94661 94662 512e8c 94661->94662 94663 514ecb 94662->94663 94790 514e90 LoadLibraryA 94663->94790 94668 514ef6 LoadLibraryExW 94798 514e59 LoadLibraryA 94668->94798 94669 553ccf 94670 514f39 68 API calls 94669->94670 94672 553cd6 94670->94672 94674 514e59 3 API calls 94672->94674 94676 553cde 94674->94676 94820 5150f5 94676->94820 94677 514f20 94677->94676 94678 514f2c 94677->94678 94679 514f39 68 API calls 94678->94679 94681 512ea5 94679->94681 94681->94568 94681->94569 94684 553d05 94685->94574 94686->94578 94687->94584 94688->94592 94689->94602 94690->94605 94691->94610 94692->94614 94693->94618 94694->94622 94695->94627 94696->94619 94697->94624 94698->94628 94699->94633 94700->94633 94701->94633 94702->94633 94704 582d15 94703->94704 94705 51511f 64 API calls 94704->94705 94706 582d29 94705->94706 94970 582e66 94706->94970 94709 582d3f 94709->94571 94710 5150f5 40 API calls 94711 582d56 94710->94711 94712 5150f5 40 API calls 94711->94712 94713 582d66 94712->94713 94714 5150f5 40 API calls 94713->94714 94715 582d81 94714->94715 94716 5150f5 40 API calls 94715->94716 94717 582d9c 94716->94717 94718 51511f 64 API calls 94717->94718 94719 582db3 94718->94719 94720 53ea0c ___std_exception_copy 21 API calls 94719->94720 94721 582dba 94720->94721 94722 53ea0c ___std_exception_copy 21 API calls 94721->94722 94723 582dc4 94722->94723 94724 5150f5 40 API calls 94723->94724 94725 582dd8 94724->94725 94726 5828fe 27 API calls 94725->94726 94727 582dee 94726->94727 94727->94709 94976 5822ce 79 API calls 94727->94976 94730 514f43 94729->94730 94732 514f4a 94729->94732 94977 53e678 94730->94977 94733 514f59 94732->94733 94734 514f6a FreeLibrary 94732->94734 94733->94573 94734->94733 94735->94585 94736->94589 94737->94595 94738->94599 94739->94603 94740->94609 94741->94616 94743 51aec9 22 API calls 94742->94743 94744 514c78 94743->94744 94744->94639 94746 554ba1 94745->94746 94747 516b67 _wcslen 94745->94747 94764 5193b2 94746->94764 94750 516ba2 94747->94750 94751 516b7d 94747->94751 94749 554baa 94749->94749 94753 52fddb 22 API calls 94750->94753 94763 516f34 22 API calls 94751->94763 94755 516bae 94753->94755 94754 516b85 __fread_nolock 94754->94639 94756 52fe0b 22 API calls 94755->94756 94756->94754 94758 51516e 94757->94758 94762 51518f __fread_nolock 94757->94762 94760 52fe0b 22 API calls 94758->94760 94759 52fddb 22 API calls 94761 5151a2 94759->94761 94760->94762 94761->94645 94762->94759 94763->94754 94765 5193c0 94764->94765 94766 5193c9 __fread_nolock 94764->94766 94765->94766 94767 51aec9 22 API calls 94765->94767 94766->94749 94767->94766 94769 513a67 GetModuleFileNameW 94768->94769 94769->94653 94771 551f50 __wsopen_s 94770->94771 94772 513aaf GetFullPathNameW 94771->94772 94773 513ae9 94772->94773 94774 513ace 94772->94774 94784 51a6c3 94773->94784 94775 516b57 22 API calls 94774->94775 94777 513ada 94775->94777 94780 5137a0 94777->94780 94781 5137ae 94780->94781 94782 5193b2 22 API calls 94781->94782 94783 5137c2 94782->94783 94783->94656 94785 51a6d0 94784->94785 94786 51a6dd 94784->94786 94785->94777 94787 52fddb 22 API calls 94786->94787 94788 51a6e7 94787->94788 94789 52fe0b 22 API calls 94788->94789 94789->94785 94791 514ec6 94790->94791 94792 514ea8 GetProcAddress 94790->94792 94795 53e5eb 94791->94795 94793 514eb8 94792->94793 94793->94791 94794 514ebf FreeLibrary 94793->94794 94794->94791 94828 53e52a 94795->94828 94797 514eea 94797->94668 94797->94669 94799 514e8d 94798->94799 94800 514e6e GetProcAddress 94798->94800 94803 514f80 94799->94803 94801 514e7e 94800->94801 94801->94799 94802 514e86 FreeLibrary 94801->94802 94802->94799 94804 52fe0b 22 API calls 94803->94804 94805 514f95 94804->94805 94896 515722 94805->94896 94807 514fa1 __fread_nolock 94808 5150a5 94807->94808 94809 553d1d 94807->94809 94818 514fdc 94807->94818 94899 5142a2 CreateStreamOnHGlobal 94808->94899 94910 58304d 74 API calls 94809->94910 94812 553d22 94814 51511f 64 API calls 94812->94814 94813 5150f5 40 API calls 94813->94818 94815 553d45 94814->94815 94816 5150f5 40 API calls 94815->94816 94819 51506e ISource 94816->94819 94818->94812 94818->94813 94818->94819 94905 51511f 94818->94905 94819->94677 94821 515107 94820->94821 94824 553d70 94820->94824 94932 53e8c4 94821->94932 94825 5828fe 94953 58274e 94825->94953 94827 582919 94827->94684 94831 53e536 BuildCatchObjectHelperInternal 94828->94831 94829 53e544 94853 53f2d9 20 API calls __dosmaperr 94829->94853 94831->94829 94833 53e574 94831->94833 94832 53e549 94854 5427ec 26 API calls _strftime 94832->94854 94835 53e586 94833->94835 94836 53e579 94833->94836 94845 548061 94835->94845 94855 53f2d9 20 API calls __dosmaperr 94836->94855 94839 53e58f 94840 53e5a2 94839->94840 94841 53e595 94839->94841 94857 53e5d4 LeaveCriticalSection __fread_nolock 94840->94857 94856 53f2d9 20 API calls __dosmaperr 94841->94856 94843 53e554 __fread_nolock 94843->94797 94846 54806d BuildCatchObjectHelperInternal 94845->94846 94858 542f5e EnterCriticalSection 94846->94858 94848 54807b 94859 5480fb 94848->94859 94852 5480ac __fread_nolock 94852->94839 94853->94832 94854->94843 94855->94843 94856->94843 94857->94843 94858->94848 94867 54811e 94859->94867 94860 548177 94877 544c7d 94860->94877 94865 548189 94871 548088 94865->94871 94890 543405 11 API calls 2 library calls 94865->94890 94867->94860 94867->94871 94875 53918d EnterCriticalSection 94867->94875 94876 5391a1 LeaveCriticalSection 94867->94876 94869 5481a8 94891 53918d EnterCriticalSection 94869->94891 94872 5480b7 94871->94872 94895 542fa6 LeaveCriticalSection 94872->94895 94874 5480be 94874->94852 94875->94867 94876->94867 94878 544c8a BuildCatchObjectHelperInternal 94877->94878 94879 544cca 94878->94879 94880 544cb5 RtlAllocateHeap 94878->94880 94892 534ead 7 API calls 2 library calls 94878->94892 94893 53f2d9 20 API calls __dosmaperr 94879->94893 94880->94878 94881 544cc8 94880->94881 94884 5429c8 94881->94884 94885 5429fc __dosmaperr 94884->94885 94886 5429d3 RtlFreeHeap 94884->94886 94885->94865 94886->94885 94887 5429e8 94886->94887 94894 53f2d9 20 API calls __dosmaperr 94887->94894 94889 5429ee GetLastError 94889->94885 94890->94869 94891->94871 94892->94878 94893->94881 94894->94889 94895->94874 94897 52fddb 22 API calls 94896->94897 94898 515734 94897->94898 94898->94807 94900 5142bc FindResourceExW 94899->94900 94904 5142d9 94899->94904 94901 5535ba LoadResource 94900->94901 94900->94904 94902 5535cf SizeofResource 94901->94902 94901->94904 94903 5535e3 LockResource 94902->94903 94902->94904 94903->94904 94904->94818 94906 553d90 94905->94906 94907 51512e 94905->94907 94911 53ece3 94907->94911 94910->94812 94914 53eaaa 94911->94914 94913 51513c 94913->94818 94918 53eab6 BuildCatchObjectHelperInternal 94914->94918 94915 53eac2 94927 53f2d9 20 API calls __dosmaperr 94915->94927 94917 53eae8 94929 53918d EnterCriticalSection 94917->94929 94918->94915 94918->94917 94920 53eac7 94928 5427ec 26 API calls _strftime 94920->94928 94921 53eaf4 94930 53ec0a 62 API calls 2 library calls 94921->94930 94924 53eb08 94931 53eb27 LeaveCriticalSection __fread_nolock 94924->94931 94926 53ead2 __fread_nolock 94926->94913 94927->94920 94928->94926 94929->94921 94930->94924 94931->94926 94935 53e8e1 94932->94935 94934 515118 94934->94825 94936 53e8ed BuildCatchObjectHelperInternal 94935->94936 94937 53e900 ___scrt_fastfail 94936->94937 94938 53e92d 94936->94938 94939 53e925 __fread_nolock 94936->94939 94948 53f2d9 20 API calls __dosmaperr 94937->94948 94950 53918d EnterCriticalSection 94938->94950 94939->94934 94942 53e937 94951 53e6f8 38 API calls 4 library calls 94942->94951 94943 53e91a 94949 5427ec 26 API calls _strftime 94943->94949 94946 53e94e 94952 53e96c LeaveCriticalSection __fread_nolock 94946->94952 94948->94943 94949->94939 94950->94942 94951->94946 94952->94939 94956 53e4e8 94953->94956 94955 58275d 94955->94827 94959 53e469 94956->94959 94958 53e505 94958->94955 94960 53e478 94959->94960 94962 53e48c 94959->94962 94967 53f2d9 20 API calls __dosmaperr 94960->94967 94966 53e488 __alldvrm 94962->94966 94969 54333f 11 API calls 2 library calls 94962->94969 94963 53e47d 94968 5427ec 26 API calls _strftime 94963->94968 94966->94958 94967->94963 94968->94966 94969->94966 94975 582e7a 94970->94975 94971 582d3b 94971->94709 94971->94710 94972 5150f5 40 API calls 94972->94975 94973 5828fe 27 API calls 94973->94975 94974 51511f 64 API calls 94974->94975 94975->94971 94975->94972 94975->94973 94975->94974 94976->94709 94978 53e684 BuildCatchObjectHelperInternal 94977->94978 94979 53e695 94978->94979 94980 53e6aa 94978->94980 95007 53f2d9 20 API calls __dosmaperr 94979->95007 94989 53e6a5 __fread_nolock 94980->94989 94990 53918d EnterCriticalSection 94980->94990 94983 53e69a 95008 5427ec 26 API calls _strftime 94983->95008 94984 53e6c6 94991 53e602 94984->94991 94987 53e6d1 95009 53e6ee LeaveCriticalSection __fread_nolock 94987->95009 94989->94732 94990->94984 94992 53e624 94991->94992 94993 53e60f 94991->94993 94998 53e61f 94992->94998 95010 53dc0b 94992->95010 95042 53f2d9 20 API calls __dosmaperr 94993->95042 94995 53e614 95043 5427ec 26 API calls _strftime 94995->95043 94998->94987 95003 53e646 95027 54862f 95003->95027 95006 5429c8 _free 20 API calls 95006->94998 95007->94983 95008->94989 95009->94989 95011 53dc23 95010->95011 95012 53dc1f 95010->95012 95011->95012 95013 53d955 __fread_nolock 26 API calls 95011->95013 95016 544d7a 95012->95016 95014 53dc43 95013->95014 95044 5459be 62 API calls 5 library calls 95014->95044 95017 544d90 95016->95017 95019 53e640 95016->95019 95018 5429c8 _free 20 API calls 95017->95018 95017->95019 95018->95019 95020 53d955 95019->95020 95021 53d961 95020->95021 95022 53d976 95020->95022 95045 53f2d9 20 API calls __dosmaperr 95021->95045 95022->95003 95024 53d966 95046 5427ec 26 API calls _strftime 95024->95046 95026 53d971 95026->95003 95028 548653 95027->95028 95029 54863e 95027->95029 95030 54868e 95028->95030 95034 54867a 95028->95034 95050 53f2c6 20 API calls __dosmaperr 95029->95050 95052 53f2c6 20 API calls __dosmaperr 95030->95052 95033 548643 95051 53f2d9 20 API calls __dosmaperr 95033->95051 95047 548607 95034->95047 95035 548693 95053 53f2d9 20 API calls __dosmaperr 95035->95053 95039 53e64c 95039->94998 95039->95006 95040 54869b 95054 5427ec 26 API calls _strftime 95040->95054 95042->94995 95043->94998 95044->95012 95045->95024 95046->95026 95055 548585 95047->95055 95049 54862b 95049->95039 95050->95033 95051->95039 95052->95035 95053->95040 95054->95039 95056 548591 BuildCatchObjectHelperInternal 95055->95056 95066 545147 EnterCriticalSection 95056->95066 95058 54859f 95059 5485c6 95058->95059 95060 5485d1 95058->95060 95067 5486ae 95059->95067 95082 53f2d9 20 API calls __dosmaperr 95060->95082 95063 5485cc 95083 5485fb LeaveCriticalSection __wsopen_s 95063->95083 95065 5485ee __fread_nolock 95065->95049 95066->95058 95084 5453c4 95067->95084 95069 5486c4 95097 545333 21 API calls 2 library calls 95069->95097 95071 5486be 95071->95069 95072 5453c4 __wsopen_s 26 API calls 95071->95072 95081 5486f6 95071->95081 95077 5486ed 95072->95077 95073 5453c4 __wsopen_s 26 API calls 95074 548702 CloseHandle 95073->95074 95074->95069 95078 54870e GetLastError 95074->95078 95075 54873e 95075->95063 95076 54871c 95076->95075 95098 53f2a3 20 API calls __dosmaperr 95076->95098 95080 5453c4 __wsopen_s 26 API calls 95077->95080 95078->95069 95080->95081 95081->95069 95081->95073 95082->95063 95083->95065 95085 5453e6 95084->95085 95086 5453d1 95084->95086 95090 54540b 95085->95090 95101 53f2c6 20 API calls __dosmaperr 95085->95101 95099 53f2c6 20 API calls __dosmaperr 95086->95099 95089 5453d6 95100 53f2d9 20 API calls __dosmaperr 95089->95100 95090->95071 95091 545416 95102 53f2d9 20 API calls __dosmaperr 95091->95102 95094 5453de 95094->95071 95095 54541e 95103 5427ec 26 API calls _strftime 95095->95103 95097->95076 95098->95075 95099->95089 95100->95094 95101->95091 95102->95095 95103->95094 95104 513156 95107 513170 95104->95107 95108 513187 95107->95108 95109 5131eb 95108->95109 95110 51318c 95108->95110 95147 5131e9 95108->95147 95112 5131f1 95109->95112 95113 552dfb 95109->95113 95114 513265 PostQuitMessage 95110->95114 95115 513199 95110->95115 95111 5131d0 DefWindowProcW 95121 51316a 95111->95121 95116 5131f8 95112->95116 95117 51321d SetTimer RegisterWindowMessageW 95112->95117 95166 5118e2 10 API calls 95113->95166 95114->95121 95119 5131a4 95115->95119 95120 552e7c 95115->95120 95122 513201 KillTimer 95116->95122 95123 552d9c 95116->95123 95117->95121 95125 513246 CreatePopupMenu 95117->95125 95126 552e68 95119->95126 95127 5131ae 95119->95127 95179 57bf30 34 API calls ___scrt_fastfail 95120->95179 95152 5130f2 95122->95152 95129 552dd7 MoveWindow 95123->95129 95130 552da1 95123->95130 95124 552e1c 95167 52e499 42 API calls 95124->95167 95125->95121 95156 57c161 95126->95156 95134 552e4d 95127->95134 95135 5131b9 95127->95135 95129->95121 95137 552da7 95130->95137 95138 552dc6 SetFocus 95130->95138 95134->95111 95178 570ad7 22 API calls 95134->95178 95140 5131c4 95135->95140 95141 513253 95135->95141 95136 552e8e 95136->95111 95136->95121 95137->95140 95142 552db0 95137->95142 95138->95121 95140->95111 95149 5130f2 Shell_NotifyIconW 95140->95149 95164 51326f 44 API calls ___scrt_fastfail 95141->95164 95165 5118e2 10 API calls 95142->95165 95147->95111 95148 513263 95148->95121 95150 552e41 95149->95150 95168 513837 95150->95168 95153 513154 95152->95153 95154 513104 ___scrt_fastfail 95152->95154 95163 513c50 DeleteObject DestroyWindow 95153->95163 95155 513123 Shell_NotifyIconW 95154->95155 95155->95153 95157 57c276 95156->95157 95158 57c179 ___scrt_fastfail 95156->95158 95157->95121 95180 513923 95158->95180 95160 57c25f KillTimer SetTimer 95160->95157 95161 57c1a0 95161->95160 95162 57c251 Shell_NotifyIconW 95161->95162 95162->95160 95163->95121 95164->95148 95165->95121 95166->95124 95167->95140 95169 513862 ___scrt_fastfail 95168->95169 95234 514212 95169->95234 95173 5138e8 95174 553386 Shell_NotifyIconW 95173->95174 95175 513906 Shell_NotifyIconW 95173->95175 95176 513923 24 API calls 95175->95176 95177 51391c 95176->95177 95177->95147 95178->95147 95179->95136 95181 513a13 95180->95181 95182 51393f 95180->95182 95181->95161 95202 516270 95182->95202 95185 553393 LoadStringW 95188 5533ad 95185->95188 95186 51395a 95187 516b57 22 API calls 95186->95187 95189 51396f 95187->95189 95196 513994 ___scrt_fastfail 95188->95196 95208 51a8c7 22 API calls __fread_nolock 95188->95208 95190 5533c9 95189->95190 95191 51397c 95189->95191 95209 516350 22 API calls 95190->95209 95191->95188 95193 513986 95191->95193 95207 516350 22 API calls 95193->95207 95199 5139f9 Shell_NotifyIconW 95196->95199 95197 5533d7 95197->95196 95210 5133c6 95197->95210 95199->95181 95200 5533f9 95201 5133c6 22 API calls 95200->95201 95201->95196 95203 52fe0b 22 API calls 95202->95203 95204 516295 95203->95204 95205 52fddb 22 API calls 95204->95205 95206 51394d 95205->95206 95206->95185 95206->95186 95207->95196 95208->95196 95209->95197 95211 5133dd 95210->95211 95212 5530bb 95210->95212 95219 5133ee 95211->95219 95214 52fddb 22 API calls 95212->95214 95216 5530c5 _wcslen 95214->95216 95215 5133e8 95215->95200 95217 52fe0b 22 API calls 95216->95217 95218 5530fe __fread_nolock 95217->95218 95220 5133fe _wcslen 95219->95220 95221 513411 95220->95221 95222 55311d 95220->95222 95229 51a587 95221->95229 95224 52fddb 22 API calls 95222->95224 95225 553127 95224->95225 95227 52fe0b 22 API calls 95225->95227 95226 51341e __fread_nolock 95226->95215 95228 553157 __fread_nolock 95227->95228 95230 51a598 __fread_nolock 95229->95230 95231 51a59d 95229->95231 95230->95226 95232 55f80f 95231->95232 95233 52fe0b 22 API calls 95231->95233 95233->95230 95235 5535a4 95234->95235 95236 5138b7 95234->95236 95235->95236 95237 5535ad DestroyIcon 95235->95237 95236->95173 95238 57c874 42 API calls _strftime 95236->95238 95237->95236 95238->95173 95239 5303fb 95240 530407 BuildCatchObjectHelperInternal 95239->95240 95268 52feb1 95240->95268 95242 530561 95298 53083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 95242->95298 95243 53040e 95243->95242 95246 530438 95243->95246 95245 530568 95291 534e52 95245->95291 95257 530477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 95246->95257 95279 54247d 95246->95279 95253 530457 95255 5304d8 95287 530959 95255->95287 95257->95255 95294 534e1a 38 API calls 3 library calls 95257->95294 95259 5304de 95260 5304f3 95259->95260 95295 530992 GetModuleHandleW 95260->95295 95262 5304fa 95262->95245 95263 5304fe 95262->95263 95264 530507 95263->95264 95296 534df5 28 API calls _abort 95263->95296 95297 530040 13 API calls 2 library calls 95264->95297 95267 53050f 95267->95253 95269 52feba 95268->95269 95300 530698 IsProcessorFeaturePresent 95269->95300 95271 52fec6 95301 532c94 10 API calls 3 library calls 95271->95301 95273 52fecb 95274 52fecf 95273->95274 95302 542317 95273->95302 95274->95243 95277 52fee6 95277->95243 95280 542494 95279->95280 95281 530a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95280->95281 95282 530451 95281->95282 95282->95253 95283 542421 95282->95283 95284 542450 95283->95284 95285 530a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95284->95285 95286 542479 95285->95286 95286->95257 95361 532340 95287->95361 95290 53097f 95290->95259 95363 534bcf 95291->95363 95294->95255 95295->95262 95296->95264 95297->95267 95298->95245 95300->95271 95301->95273 95306 54d1f6 95302->95306 95305 532cbd 8 API calls 3 library calls 95305->95274 95309 54d213 95306->95309 95310 54d20f 95306->95310 95308 52fed8 95308->95277 95308->95305 95309->95310 95312 544bfb 95309->95312 95324 530a8c 95310->95324 95313 544c07 BuildCatchObjectHelperInternal 95312->95313 95331 542f5e EnterCriticalSection 95313->95331 95315 544c0e 95332 5450af 95315->95332 95317 544c1d 95323 544c2c 95317->95323 95345 544a8f 29 API calls 95317->95345 95320 544c27 95346 544b45 GetStdHandle GetFileType 95320->95346 95321 544c3d __fread_nolock 95321->95309 95347 544c48 LeaveCriticalSection _abort 95323->95347 95325 530a97 IsProcessorFeaturePresent 95324->95325 95326 530a95 95324->95326 95328 530c5d 95325->95328 95326->95308 95360 530c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95328->95360 95330 530d40 95330->95308 95331->95315 95333 5450bb BuildCatchObjectHelperInternal 95332->95333 95334 5450df 95333->95334 95335 5450c8 95333->95335 95348 542f5e EnterCriticalSection 95334->95348 95356 53f2d9 20 API calls __dosmaperr 95335->95356 95338 5450cd 95357 5427ec 26 API calls _strftime 95338->95357 95340 545117 95358 54513e LeaveCriticalSection _abort 95340->95358 95341 5450d7 __fread_nolock 95341->95317 95342 5450eb 95342->95340 95349 545000 95342->95349 95345->95320 95346->95323 95347->95321 95348->95342 95350 544c7d BuildCatchObjectHelperInternal 20 API calls 95349->95350 95352 545012 95350->95352 95351 54501f 95353 5429c8 _free 20 API calls 95351->95353 95352->95351 95359 543405 11 API calls 2 library calls 95352->95359 95355 545071 95353->95355 95355->95342 95356->95338 95357->95341 95358->95341 95359->95352 95360->95330 95362 53096c GetStartupInfoW 95361->95362 95362->95290 95364 534bdb BuildCatchObjectHelperInternal 95363->95364 95365 534be2 95364->95365 95366 534bf4 95364->95366 95402 534d29 GetModuleHandleW 95365->95402 95387 542f5e EnterCriticalSection 95366->95387 95369 534be7 95369->95366 95403 534d6d GetModuleHandleExW 95369->95403 95370 534c99 95391 534cd9 95370->95391 95374 534c70 95379 534c88 95374->95379 95380 542421 _abort 5 API calls 95374->95380 95376 534bfb 95376->95370 95376->95374 95388 5421a8 95376->95388 95377 534ce2 95411 551d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 95377->95411 95378 534cb6 95394 534ce8 95378->95394 95381 542421 _abort 5 API calls 95379->95381 95380->95379 95381->95370 95387->95376 95412 541ee1 95388->95412 95431 542fa6 LeaveCriticalSection 95391->95431 95393 534cb2 95393->95377 95393->95378 95432 54360c 95394->95432 95397 534d16 95400 534d6d _abort 8 API calls 95397->95400 95398 534cf6 GetPEB 95398->95397 95399 534d06 GetCurrentProcess TerminateProcess 95398->95399 95399->95397 95401 534d1e ExitProcess 95400->95401 95402->95369 95404 534d97 GetProcAddress 95403->95404 95405 534dba 95403->95405 95410 534dac 95404->95410 95406 534dc0 FreeLibrary 95405->95406 95407 534dc9 95405->95407 95406->95407 95408 530a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95407->95408 95409 534bf3 95408->95409 95409->95366 95410->95405 95415 541e90 95412->95415 95414 541f05 95414->95374 95416 541e9c BuildCatchObjectHelperInternal 95415->95416 95423 542f5e EnterCriticalSection 95416->95423 95418 541eaa 95424 541f31 95418->95424 95422 541ec8 __fread_nolock 95422->95414 95423->95418 95427 541f59 95424->95427 95428 541f51 95424->95428 95425 530a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95426 541eb7 95425->95426 95430 541ed5 LeaveCriticalSection _abort 95426->95430 95427->95428 95429 5429c8 _free 20 API calls 95427->95429 95428->95425 95429->95428 95430->95422 95431->95393 95433 543627 95432->95433 95434 543631 95432->95434 95436 530a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95433->95436 95439 542fd7 5 API calls 2 library calls 95434->95439 95437 534cf2 95436->95437 95437->95397 95437->95398 95438 543648 95438->95433 95439->95438 95440 511098 95445 5142de 95440->95445 95444 5110a7 95446 51a961 22 API calls 95445->95446 95447 5142f5 GetVersionExW 95446->95447 95448 516b57 22 API calls 95447->95448 95449 514342 95448->95449 95450 5193b2 22 API calls 95449->95450 95462 514378 95449->95462 95451 51436c 95450->95451 95453 5137a0 22 API calls 95451->95453 95452 51441b GetCurrentProcess IsWow64Process 95454 514437 95452->95454 95453->95462 95455 553824 GetSystemInfo 95454->95455 95456 51444f LoadLibraryA 95454->95456 95457 514460 GetProcAddress 95456->95457 95458 51449c GetSystemInfo 95456->95458 95457->95458 95460 514470 GetNativeSystemInfo 95457->95460 95461 514476 95458->95461 95459 5537df 95460->95461 95463 51109d 95461->95463 95464 51447a FreeLibrary 95461->95464 95462->95452 95462->95459 95465 5300a3 29 API calls __onexit 95463->95465 95464->95463 95465->95444 95466 51105b 95471 51344d 95466->95471 95468 51106a 95502 5300a3 29 API calls __onexit 95468->95502 95470 511074 95472 51345d __wsopen_s 95471->95472 95473 51a961 22 API calls 95472->95473 95474 513513 95473->95474 95475 513a5a 24 API calls 95474->95475 95476 51351c 95475->95476 95503 513357 95476->95503 95479 5133c6 22 API calls 95480 513535 95479->95480 95481 51515f 22 API calls 95480->95481 95482 513544 95481->95482 95483 51a961 22 API calls 95482->95483 95484 51354d 95483->95484 95485 51a6c3 22 API calls 95484->95485 95486 513556 RegOpenKeyExW 95485->95486 95487 553176 RegQueryValueExW 95486->95487 95492 513578 95486->95492 95488 553193 95487->95488 95489 55320c RegCloseKey 95487->95489 95490 52fe0b 22 API calls 95488->95490 95489->95492 95500 55321e _wcslen 95489->95500 95491 5531ac 95490->95491 95493 515722 22 API calls 95491->95493 95492->95468 95494 5531b7 RegQueryValueExW 95493->95494 95495 5531d4 95494->95495 95497 5531ee ISource 95494->95497 95496 516b57 22 API calls 95495->95496 95496->95497 95497->95489 95498 519cb3 22 API calls 95498->95500 95499 51515f 22 API calls 95499->95500 95500->95492 95500->95498 95500->95499 95501 514c6d 22 API calls 95500->95501 95501->95500 95502->95470 95504 551f50 __wsopen_s 95503->95504 95505 513364 GetFullPathNameW 95504->95505 95506 513386 95505->95506 95507 516b57 22 API calls 95506->95507 95508 5133a4 95507->95508 95508->95479 95509 51defc 95512 511d6f 95509->95512 95511 51df07 95513 511d8c 95512->95513 95521 511f6f 95513->95521 95515 511da6 95516 552759 95515->95516 95518 511e36 95515->95518 95519 511dc2 95515->95519 95525 58359c 82 API calls __wsopen_s 95516->95525 95518->95511 95519->95518 95524 51289a 23 API calls 95519->95524 95522 51ec40 348 API calls 95521->95522 95523 511f98 95522->95523 95523->95515 95524->95518 95525->95518 95526 51f7bf 95527 51f7d3 95526->95527 95528 51fcb6 95526->95528 95530 51fcc2 95527->95530 95531 52fddb 22 API calls 95527->95531 95529 51aceb 23 API calls 95528->95529 95529->95530 95532 51aceb 23 API calls 95530->95532 95533 51f7e5 95531->95533 95534 51fd3d 95532->95534 95533->95530 95533->95534 95535 51f83e 95533->95535 95620 581155 22 API calls 95534->95620 95549 51ed9d ISource 95535->95549 95561 521310 95535->95561 95538 51fef7 95538->95549 95622 51a8c7 22 API calls __fread_nolock 95538->95622 95541 564b0b 95624 58359c 82 API calls __wsopen_s 95541->95624 95542 564600 95542->95549 95621 51a8c7 22 API calls __fread_nolock 95542->95621 95547 51a8c7 22 API calls 95558 51ec76 ISource 95547->95558 95550 51fbe3 95550->95549 95552 564bdc 95550->95552 95560 51f3ae ISource 95550->95560 95551 51a961 22 API calls 95551->95558 95625 58359c 82 API calls __wsopen_s 95552->95625 95553 5300a3 29 API calls pre_c_initialization 95553->95558 95554 530242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95554->95558 95556 564beb 95626 58359c 82 API calls __wsopen_s 95556->95626 95557 52fddb 22 API calls 95557->95558 95558->95538 95558->95541 95558->95542 95558->95547 95558->95549 95558->95550 95558->95551 95558->95553 95558->95554 95558->95556 95558->95557 95559 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95558->95559 95558->95560 95618 5201e0 348 API calls 2 library calls 95558->95618 95619 5206a0 41 API calls ISource 95558->95619 95559->95558 95560->95549 95623 58359c 82 API calls __wsopen_s 95560->95623 95562 5217b0 95561->95562 95563 521376 95561->95563 95666 530242 5 API calls __Init_thread_wait 95562->95666 95564 521390 95563->95564 95565 566331 95563->95565 95627 521940 95564->95627 95670 59709c 348 API calls 95565->95670 95569 5217ba 95570 5217fb 95569->95570 95573 519cb3 22 API calls 95569->95573 95576 566346 95570->95576 95578 52182c 95570->95578 95572 56633d 95572->95558 95581 5217d4 95573->95581 95574 521940 9 API calls 95575 5213b6 95574->95575 95575->95570 95577 5213ec 95575->95577 95671 58359c 82 API calls __wsopen_s 95576->95671 95577->95576 95600 521408 __fread_nolock 95577->95600 95580 51aceb 23 API calls 95578->95580 95583 521839 95580->95583 95667 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95581->95667 95582 566369 95582->95558 95668 52d217 348 API calls 95583->95668 95586 56636e 95672 58359c 82 API calls __wsopen_s 95586->95672 95588 5663d1 95674 595745 54 API calls _wcslen 95588->95674 95589 52153c 95591 521940 9 API calls 95589->95591 95592 521549 95591->95592 95597 521940 9 API calls 95592->95597 95603 5664fa 95592->95603 95593 52fddb 22 API calls 95593->95600 95594 521872 95669 52faeb 23 API calls 95594->95669 95595 52fe0b 22 API calls 95595->95600 95599 521563 95597->95599 95599->95603 95609 5215c7 ISource 95599->95609 95675 51a8c7 22 API calls __fread_nolock 95599->95675 95600->95582 95600->95583 95600->95586 95600->95593 95600->95595 95601 51ec40 348 API calls 95600->95601 95602 52152f 95600->95602 95604 5663b2 95600->95604 95601->95600 95602->95588 95602->95589 95603->95582 95676 58359c 82 API calls __wsopen_s 95603->95676 95673 58359c 82 API calls __wsopen_s 95604->95673 95607 521940 9 API calls 95607->95609 95608 52171d 95608->95558 95609->95582 95609->95594 95609->95603 95609->95607 95611 52167b ISource 95609->95611 95637 59ab67 95609->95637 95640 59a2ea 95609->95640 95645 585c5a 95609->95645 95650 5a1591 95609->95650 95653 59abf7 95609->95653 95658 52f645 95609->95658 95611->95608 95665 52ce17 22 API calls ISource 95611->95665 95618->95558 95619->95558 95620->95549 95621->95549 95622->95549 95623->95549 95624->95549 95625->95556 95626->95549 95628 521981 95627->95628 95629 52195d 95627->95629 95677 530242 5 API calls __Init_thread_wait 95628->95677 95636 5213a0 95629->95636 95679 530242 5 API calls __Init_thread_wait 95629->95679 95631 52198b 95631->95629 95678 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95631->95678 95634 528727 95634->95636 95680 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95634->95680 95636->95574 95681 59aff9 95637->95681 95641 517510 53 API calls 95640->95641 95642 59a306 95641->95642 95836 57d4dc CreateToolhelp32Snapshot Process32FirstW 95642->95836 95644 59a315 95644->95609 95646 517510 53 API calls 95645->95646 95647 585c6d 95646->95647 95857 57dbbe lstrlenW 95647->95857 95649 585c77 95649->95609 95862 5a2ad8 95650->95862 95652 5a159f 95652->95609 95654 59aff9 217 API calls 95653->95654 95655 59ac0c 95654->95655 95656 59ac54 95655->95656 95657 51aceb 23 API calls 95655->95657 95656->95609 95657->95656 95659 51b567 39 API calls 95658->95659 95660 52f659 95659->95660 95661 52f661 timeGetTime 95660->95661 95662 56f2dc Sleep 95660->95662 95663 51b567 39 API calls 95661->95663 95664 52f677 95663->95664 95664->95609 95665->95611 95666->95569 95667->95570 95668->95594 95669->95594 95670->95572 95671->95582 95672->95582 95673->95582 95674->95599 95675->95609 95676->95582 95677->95631 95678->95629 95679->95634 95680->95636 95682 59b01d ___scrt_fastfail 95681->95682 95683 59b058 95682->95683 95684 59b094 95682->95684 95802 51b567 95683->95802 95686 51b567 39 API calls 95684->95686 95695 59b08b 95684->95695 95688 59b0a5 95686->95688 95691 51b567 39 API calls 95688->95691 95689 59b063 95692 51b567 39 API calls 95689->95692 95689->95695 95691->95695 95696 59b078 95692->95696 95693 51b567 39 API calls 95697 59b0ed 95693->95697 95695->95693 95695->95697 95699 51b567 39 API calls 95696->95699 95772 517510 95697->95772 95698 59b115 95700 59b1d8 95698->95700 95701 59b11f 95698->95701 95699->95695 95703 59b20a GetCurrentDirectoryW 95700->95703 95706 517510 53 API calls 95700->95706 95702 517510 53 API calls 95701->95702 95704 59b130 95702->95704 95705 52fe0b 22 API calls 95703->95705 95708 517620 22 API calls 95704->95708 95709 59b22f GetCurrentDirectoryW 95705->95709 95707 59b1ef 95706->95707 95710 517620 22 API calls 95707->95710 95711 59b13a 95708->95711 95712 59b23c 95709->95712 95713 59b1f9 _wcslen 95710->95713 95714 517510 53 API calls 95711->95714 95716 59b275 95712->95716 95807 519c6e 22 API calls 95712->95807 95713->95703 95713->95716 95715 59b14b 95714->95715 95717 517620 22 API calls 95715->95717 95721 59b28b 95716->95721 95722 59b287 95716->95722 95719 59b155 95717->95719 95723 517510 53 API calls 95719->95723 95720 59b255 95808 519c6e 22 API calls 95720->95808 95810 5807c0 10 API calls 95721->95810 95731 59b2f8 95722->95731 95732 59b39a CreateProcessW 95722->95732 95726 59b166 95723->95726 95728 517620 22 API calls 95726->95728 95727 59b265 95809 519c6e 22 API calls 95727->95809 95733 59b170 95728->95733 95730 59b294 95811 5806e6 10 API calls 95730->95811 95813 5711c8 39 API calls 95731->95813 95771 59b32f _wcslen 95732->95771 95737 59b1a6 GetSystemDirectoryW 95733->95737 95741 517510 53 API calls 95733->95741 95736 59b2fd 95739 59b32a 95736->95739 95740 59b323 95736->95740 95743 52fe0b 22 API calls 95737->95743 95738 59b2aa 95812 5805a7 8 API calls 95738->95812 95815 5714ce 6 API calls 95739->95815 95814 571201 128 API calls 2 library calls 95740->95814 95745 59b187 95741->95745 95748 59b1cb GetSystemDirectoryW 95743->95748 95750 517620 22 API calls 95745->95750 95747 59b2d0 95747->95722 95748->95712 95749 59b328 95749->95771 95751 59b191 _wcslen 95750->95751 95751->95712 95751->95737 95752 59b42f CloseHandle 95754 59b43f 95752->95754 95762 59b49a 95752->95762 95753 59b3d6 GetLastError 95761 59b41a 95753->95761 95756 59b451 95754->95756 95757 59b446 CloseHandle 95754->95757 95759 59b458 CloseHandle 95756->95759 95760 59b463 95756->95760 95757->95756 95758 59b4a6 95758->95761 95759->95760 95763 59b46a CloseHandle 95760->95763 95764 59b475 95760->95764 95799 580175 95761->95799 95762->95758 95768 59b4d2 CloseHandle 95762->95768 95763->95764 95816 5809d9 34 API calls 95764->95816 95767 59b486 95817 59b536 25 API calls 95767->95817 95768->95761 95771->95752 95771->95753 95773 517525 95772->95773 95789 517522 95772->95789 95774 51755b 95773->95774 95775 51752d 95773->95775 95777 51756d 95774->95777 95784 5550f6 95774->95784 95786 55500f 95774->95786 95818 5351c6 26 API calls 95775->95818 95819 52fb21 51 API calls 95777->95819 95780 51753d 95783 52fddb 22 API calls 95780->95783 95781 55510e 95781->95781 95785 517547 95783->95785 95821 535183 26 API calls 95784->95821 95787 519cb3 22 API calls 95785->95787 95788 52fe0b 22 API calls 95786->95788 95794 555088 95786->95794 95787->95789 95790 555058 95788->95790 95795 517620 95789->95795 95791 52fddb 22 API calls 95790->95791 95792 55507f 95791->95792 95793 519cb3 22 API calls 95792->95793 95793->95794 95820 52fb21 51 API calls 95794->95820 95796 51762a _wcslen 95795->95796 95797 52fe0b 22 API calls 95796->95797 95798 51763f 95797->95798 95798->95698 95822 58030f 95799->95822 95803 51b57f 95802->95803 95804 51b578 95802->95804 95803->95689 95804->95803 95835 5362d1 39 API calls 95804->95835 95806 51b5c2 95806->95689 95807->95720 95808->95727 95809->95716 95810->95730 95811->95738 95812->95747 95813->95736 95814->95749 95815->95771 95816->95767 95817->95762 95818->95780 95819->95780 95820->95784 95821->95781 95823 580329 95822->95823 95824 580321 CloseHandle 95822->95824 95825 58032e CloseHandle 95823->95825 95826 580336 95823->95826 95824->95823 95825->95826 95827 58033b CloseHandle 95826->95827 95828 580343 95826->95828 95827->95828 95829 580348 CloseHandle 95828->95829 95830 580350 95828->95830 95829->95830 95831 58035d 95830->95831 95832 580355 CloseHandle 95830->95832 95833 58017d 95831->95833 95834 580362 CloseHandle 95831->95834 95832->95831 95833->95609 95834->95833 95835->95806 95846 57def7 95836->95846 95838 57d5db CloseHandle 95838->95644 95839 57d529 Process32NextW 95839->95838 95841 57d522 95839->95841 95840 51a961 22 API calls 95840->95841 95841->95838 95841->95839 95841->95840 95842 519cb3 22 API calls 95841->95842 95852 51525f 22 API calls 95841->95852 95853 516350 22 API calls 95841->95853 95854 52ce60 41 API calls 95841->95854 95842->95841 95847 57df02 95846->95847 95848 57df19 95847->95848 95851 57df1f 95847->95851 95855 5363b2 GetStringTypeW _strftime 95847->95855 95856 5362fb 39 API calls 95848->95856 95851->95841 95852->95841 95853->95841 95854->95841 95855->95847 95856->95851 95858 57dc06 95857->95858 95859 57dbdc GetFileAttributesW 95857->95859 95858->95649 95859->95858 95860 57dbe8 FindFirstFileW 95859->95860 95860->95858 95861 57dbf9 FindClose 95860->95861 95861->95858 95863 51aceb 23 API calls 95862->95863 95864 5a2af3 95863->95864 95865 5a2aff 95864->95865 95866 5a2b1d 95864->95866 95867 517510 53 API calls 95865->95867 95868 516b57 22 API calls 95866->95868 95869 5a2b0c 95867->95869 95871 5a2b1b 95868->95871 95869->95871 95872 51a8c7 22 API calls __fread_nolock 95869->95872 95871->95652 95872->95871 95873 5a2a55 95881 581ebc 95873->95881 95876 5a2a70 95883 5739c0 22 API calls 95876->95883 95877 5a2a87 95879 5a2a7c 95884 57417d 22 API calls __fread_nolock 95879->95884 95882 581ec3 IsWindow 95881->95882 95882->95876 95882->95877 95883->95879 95884->95877 95885 552ba5 95886 512b25 95885->95886 95887 552baf 95885->95887 95913 512b83 7 API calls 95886->95913 95889 513a5a 24 API calls 95887->95889 95891 552bb8 95889->95891 95893 519cb3 22 API calls 95891->95893 95895 552bc6 95893->95895 95894 512b2f 95899 513837 49 API calls 95894->95899 95903 512b44 95894->95903 95896 552bf5 95895->95896 95897 552bce 95895->95897 95898 5133c6 22 API calls 95896->95898 95900 5133c6 22 API calls 95897->95900 95901 552bf1 GetForegroundWindow ShellExecuteW 95898->95901 95899->95903 95902 552bd9 95900->95902 95908 552c26 95901->95908 95917 516350 22 API calls 95902->95917 95904 512b5f 95903->95904 95907 5130f2 Shell_NotifyIconW 95903->95907 95911 512b66 SetCurrentDirectoryW 95904->95911 95907->95904 95908->95904 95909 552be7 95910 5133c6 22 API calls 95909->95910 95910->95901 95912 512b7a 95911->95912 95918 512cd4 7 API calls 95913->95918 95915 512b2a 95916 512c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95915->95916 95916->95894 95917->95909 95918->95915 95919 539141 95929 53dcb8 95919->95929 95923 53914e 95924 544d7a 20 API calls 95923->95924 95925 53915d DeleteCriticalSection 95924->95925 95925->95923 95926 539178 95925->95926 95927 5429c8 _free 20 API calls 95926->95927 95928 539183 95927->95928 95942 53dcc1 95929->95942 95931 539149 95932 544cda 95931->95932 95933 544ce6 BuildCatchObjectHelperInternal 95932->95933 95959 542f5e EnterCriticalSection 95933->95959 95935 544d5c 95960 544d71 95935->95960 95937 544d68 __fread_nolock 95937->95923 95938 544d30 DeleteCriticalSection 95940 5429c8 _free 20 API calls 95938->95940 95939 53e678 67 API calls 95941 544cf1 95939->95941 95940->95941 95941->95935 95941->95938 95941->95939 95943 53dccd BuildCatchObjectHelperInternal 95942->95943 95952 542f5e EnterCriticalSection 95943->95952 95945 53dd70 95953 53dd90 95945->95953 95949 53dd7c __fread_nolock 95949->95931 95950 53dc71 66 API calls 95951 53dcdc 95950->95951 95951->95945 95951->95950 95956 53918d EnterCriticalSection 95951->95956 95957 53dd66 LeaveCriticalSection __fread_nolock 95951->95957 95952->95951 95958 542fa6 LeaveCriticalSection 95953->95958 95955 53dd97 95955->95949 95956->95951 95957->95951 95958->95955 95959->95941 95963 542fa6 LeaveCriticalSection 95960->95963 95962 544d78 95962->95937 95963->95962 95964 512de3 95965 512df0 __wsopen_s 95964->95965 95966 512e09 95965->95966 95967 552c2b ___scrt_fastfail 95965->95967 95968 513aa2 23 API calls 95966->95968 95970 552c47 GetOpenFileNameW 95967->95970 95969 512e12 95968->95969 95980 512da5 95969->95980 95971 552c96 95970->95971 95973 516b57 22 API calls 95971->95973 95975 552cab 95973->95975 95975->95975 95977 512e27 95998 5144a8 95977->95998 95981 551f50 __wsopen_s 95980->95981 95982 512db2 GetLongPathNameW 95981->95982 95983 516b57 22 API calls 95982->95983 95984 512dda 95983->95984 95985 513598 95984->95985 95986 51a961 22 API calls 95985->95986 95987 5135aa 95986->95987 95988 513aa2 23 API calls 95987->95988 95989 5135b5 95988->95989 95990 5135c0 95989->95990 95991 5532eb 95989->95991 95992 51515f 22 API calls 95990->95992 95996 55330d 95991->95996 96033 52ce60 41 API calls 95991->96033 95994 5135cc 95992->95994 96027 5135f3 95994->96027 95997 5135df 95997->95977 95999 514ecb 94 API calls 95998->95999 96000 5144cd 95999->96000 96001 553833 96000->96001 96002 514ecb 94 API calls 96000->96002 96003 582cf9 80 API calls 96001->96003 96004 5144e1 96002->96004 96005 553848 96003->96005 96004->96001 96006 5144e9 96004->96006 96007 55384c 96005->96007 96008 553869 96005->96008 96010 553854 96006->96010 96011 5144f5 96006->96011 96012 514f39 68 API calls 96007->96012 96009 52fe0b 22 API calls 96008->96009 96019 5538ae 96009->96019 96035 57da5a 82 API calls 96010->96035 96034 51940c 136 API calls 2 library calls 96011->96034 96012->96010 96015 553862 96015->96008 96016 512e31 96017 514f39 68 API calls 96021 553a5f 96017->96021 96019->96021 96024 519cb3 22 API calls 96019->96024 96036 57967e 22 API calls __fread_nolock 96019->96036 96037 5795ad 42 API calls _wcslen 96019->96037 96038 580b5a 22 API calls 96019->96038 96039 51a4a1 22 API calls __fread_nolock 96019->96039 96040 513ff7 22 API calls 96019->96040 96021->96017 96041 57989b 82 API calls __wsopen_s 96021->96041 96024->96019 96028 513605 96027->96028 96032 513624 __fread_nolock 96027->96032 96030 52fe0b 22 API calls 96028->96030 96029 52fddb 22 API calls 96031 51363b 96029->96031 96030->96032 96031->95997 96032->96029 96033->95991 96034->96016 96035->96015 96036->96019 96037->96019 96038->96019 96039->96019 96040->96019 96041->96021 96042 511044 96047 5110f3 96042->96047 96044 51104a 96083 5300a3 29 API calls __onexit 96044->96083 96046 511054 96084 511398 96047->96084 96051 51116a 96052 51a961 22 API calls 96051->96052 96053 511174 96052->96053 96054 51a961 22 API calls 96053->96054 96055 51117e 96054->96055 96056 51a961 22 API calls 96055->96056 96057 511188 96056->96057 96058 51a961 22 API calls 96057->96058 96059 5111c6 96058->96059 96060 51a961 22 API calls 96059->96060 96061 511292 96060->96061 96094 51171c 96061->96094 96065 5112c4 96066 51a961 22 API calls 96065->96066 96067 5112ce 96066->96067 96068 521940 9 API calls 96067->96068 96069 5112f9 96068->96069 96115 511aab 96069->96115 96071 511315 96072 511325 GetStdHandle 96071->96072 96073 552485 96072->96073 96074 51137a 96072->96074 96073->96074 96075 55248e 96073->96075 96077 511387 OleInitialize 96074->96077 96076 52fddb 22 API calls 96075->96076 96078 552495 96076->96078 96077->96044 96122 58011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96078->96122 96080 55249e 96123 580944 CreateThread 96080->96123 96082 5524aa CloseHandle 96082->96074 96083->96046 96124 5113f1 96084->96124 96087 5113f1 22 API calls 96088 5113d0 96087->96088 96089 51a961 22 API calls 96088->96089 96090 5113dc 96089->96090 96091 516b57 22 API calls 96090->96091 96092 511129 96091->96092 96093 511bc3 6 API calls 96092->96093 96093->96051 96095 51a961 22 API calls 96094->96095 96096 51172c 96095->96096 96097 51a961 22 API calls 96096->96097 96098 511734 96097->96098 96099 51a961 22 API calls 96098->96099 96100 51174f 96099->96100 96101 52fddb 22 API calls 96100->96101 96102 51129c 96101->96102 96103 511b4a 96102->96103 96104 511b58 96103->96104 96105 51a961 22 API calls 96104->96105 96106 511b63 96105->96106 96107 51a961 22 API calls 96106->96107 96108 511b6e 96107->96108 96109 51a961 22 API calls 96108->96109 96110 511b79 96109->96110 96111 51a961 22 API calls 96110->96111 96112 511b84 96111->96112 96113 52fddb 22 API calls 96112->96113 96114 511b96 RegisterWindowMessageW 96113->96114 96114->96065 96116 55272d 96115->96116 96117 511abb 96115->96117 96131 583209 23 API calls 96116->96131 96118 52fddb 22 API calls 96117->96118 96121 511ac3 96118->96121 96120 552738 96121->96071 96122->96080 96123->96082 96132 58092a 28 API calls 96123->96132 96125 51a961 22 API calls 96124->96125 96126 5113fc 96125->96126 96127 51a961 22 API calls 96126->96127 96128 511404 96127->96128 96129 51a961 22 API calls 96128->96129 96130 5113c6 96129->96130 96130->96087 96131->96120 96133 548402 96138 5481be 96133->96138 96136 54842a 96141 5481ef try_get_first_available_module 96138->96141 96140 5483ee 96157 5427ec 26 API calls _strftime 96140->96157 96149 548338 96141->96149 96153 538e0b 40 API calls 2 library calls 96141->96153 96143 548343 96143->96136 96150 550984 96143->96150 96145 54838c 96145->96149 96154 538e0b 40 API calls 2 library calls 96145->96154 96147 5483ab 96147->96149 96155 538e0b 40 API calls 2 library calls 96147->96155 96149->96143 96156 53f2d9 20 API calls __dosmaperr 96149->96156 96158 550081 96150->96158 96152 55099f 96152->96136 96153->96145 96154->96147 96155->96149 96156->96140 96157->96143 96159 55008d BuildCatchObjectHelperInternal 96158->96159 96160 55009b 96159->96160 96163 5500d4 96159->96163 96215 53f2d9 20 API calls __dosmaperr 96160->96215 96162 5500a0 96216 5427ec 26 API calls _strftime 96162->96216 96169 55065b 96163->96169 96168 5500aa __fread_nolock 96168->96152 96170 550678 96169->96170 96171 5506a6 96170->96171 96172 55068d 96170->96172 96218 545221 96171->96218 96232 53f2c6 20 API calls __dosmaperr 96172->96232 96175 5506ab 96176 5506b4 96175->96176 96177 5506cb 96175->96177 96234 53f2c6 20 API calls __dosmaperr 96176->96234 96231 55039a CreateFileW 96177->96231 96181 5506b9 96235 53f2d9 20 API calls __dosmaperr 96181->96235 96183 550781 GetFileType 96184 55078c GetLastError 96183->96184 96189 5507d3 96183->96189 96238 53f2a3 20 API calls __dosmaperr 96184->96238 96185 550756 GetLastError 96237 53f2a3 20 API calls __dosmaperr 96185->96237 96186 550704 96186->96183 96186->96185 96236 55039a CreateFileW 96186->96236 96240 54516a 21 API calls 2 library calls 96189->96240 96190 550692 96233 53f2d9 20 API calls __dosmaperr 96190->96233 96191 55079a CloseHandle 96191->96190 96193 5507c3 96191->96193 96239 53f2d9 20 API calls __dosmaperr 96193->96239 96195 550749 96195->96183 96195->96185 96196 5507f4 96198 550840 96196->96198 96241 5505ab 72 API calls 3 library calls 96196->96241 96203 55086d 96198->96203 96242 55014d 72 API calls 4 library calls 96198->96242 96199 5507c8 96199->96190 96202 550866 96202->96203 96204 55087e 96202->96204 96205 5486ae __wsopen_s 29 API calls 96203->96205 96206 5500f8 96204->96206 96207 5508fc CloseHandle 96204->96207 96205->96206 96217 550121 LeaveCriticalSection __wsopen_s 96206->96217 96243 55039a CreateFileW 96207->96243 96209 550927 96210 550931 GetLastError 96209->96210 96211 55095d 96209->96211 96244 53f2a3 20 API calls __dosmaperr 96210->96244 96211->96206 96213 55093d 96245 545333 21 API calls 2 library calls 96213->96245 96215->96162 96216->96168 96217->96168 96219 54522d BuildCatchObjectHelperInternal 96218->96219 96246 542f5e EnterCriticalSection 96219->96246 96221 545234 96222 545259 96221->96222 96227 5452c7 EnterCriticalSection 96221->96227 96229 54527b 96221->96229 96224 545000 __wsopen_s 21 API calls 96222->96224 96226 54525e 96224->96226 96225 5452a4 __fread_nolock 96225->96175 96226->96229 96250 545147 EnterCriticalSection 96226->96250 96228 5452d4 LeaveCriticalSection 96227->96228 96227->96229 96228->96221 96247 54532a 96229->96247 96231->96186 96232->96190 96233->96206 96234->96181 96235->96190 96236->96195 96237->96190 96238->96191 96239->96199 96240->96196 96241->96198 96242->96202 96243->96209 96244->96213 96245->96211 96246->96221 96251 542fa6 LeaveCriticalSection 96247->96251 96249 545331 96249->96225 96250->96229 96251->96249 96252 562a00 96267 51d7b0 ISource 96252->96267 96253 51db11 PeekMessageW 96253->96267 96254 51d807 GetInputState 96254->96253 96254->96267 96255 561cbe TranslateAcceleratorW 96255->96267 96257 51db73 TranslateMessage DispatchMessageW 96258 51db8f PeekMessageW 96257->96258 96258->96267 96259 51da04 timeGetTime 96259->96267 96260 51dbaf Sleep 96260->96267 96261 562b74 Sleep 96274 562a51 96261->96274 96263 561dda timeGetTime 96298 52e300 23 API calls 96263->96298 96265 57d4dc 47 API calls 96265->96274 96267->96253 96267->96254 96267->96255 96267->96257 96267->96258 96267->96259 96267->96260 96267->96261 96267->96263 96272 51d9d5 96267->96272 96267->96274 96280 51ec40 348 API calls 96267->96280 96281 521310 348 API calls 96267->96281 96282 51bf40 348 API calls 96267->96282 96284 51dd50 96267->96284 96291 52edf6 96267->96291 96296 51dfd0 348 API calls 3 library calls 96267->96296 96297 52e551 timeGetTime 96267->96297 96299 583a2a 23 API calls 96267->96299 96300 58359c 82 API calls __wsopen_s 96267->96300 96268 562c0b GetExitCodeProcess 96270 562c37 CloseHandle 96268->96270 96271 562c21 WaitForSingleObject 96268->96271 96270->96274 96271->96267 96271->96270 96273 5a29bf GetForegroundWindow 96273->96274 96274->96265 96274->96267 96274->96268 96274->96272 96274->96273 96275 562ca9 Sleep 96274->96275 96301 595658 23 API calls 96274->96301 96302 57e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96274->96302 96303 52e551 timeGetTime 96274->96303 96275->96267 96280->96267 96281->96267 96282->96267 96285 51dd83 96284->96285 96286 51dd6f 96284->96286 96336 58359c 82 API calls __wsopen_s 96285->96336 96304 51d260 96286->96304 96289 51dd7a 96289->96267 96290 562f75 96290->96290 96293 52ee09 96291->96293 96295 52ee12 96291->96295 96292 52ee36 IsDialogMessageW 96292->96293 96292->96295 96293->96267 96294 56efaf GetClassLongW 96294->96292 96294->96295 96295->96292 96295->96293 96295->96294 96296->96267 96297->96267 96298->96267 96299->96267 96300->96267 96301->96274 96302->96274 96303->96274 96305 51ec40 348 API calls 96304->96305 96322 51d29d 96305->96322 96306 561bc4 96342 58359c 82 API calls __wsopen_s 96306->96342 96308 51d30b ISource 96308->96289 96309 51d6d5 96309->96308 96320 52fe0b 22 API calls 96309->96320 96310 51d3c3 96310->96309 96312 51d3ce 96310->96312 96311 51d5ff 96313 561bb5 96311->96313 96314 51d614 96311->96314 96316 52fddb 22 API calls 96312->96316 96341 595705 23 API calls 96313->96341 96318 52fddb 22 API calls 96314->96318 96315 51d4b8 96321 52fe0b 22 API calls 96315->96321 96325 51d3d5 __fread_nolock 96316->96325 96329 51d46a 96318->96329 96319 52fddb 22 API calls 96319->96322 96320->96325 96331 51d429 ISource __fread_nolock 96321->96331 96322->96306 96322->96308 96322->96309 96322->96310 96322->96315 96322->96319 96322->96331 96323 52fddb 22 API calls 96324 51d3f6 96323->96324 96324->96331 96337 51bec0 348 API calls 96324->96337 96325->96323 96325->96324 96327 561ba4 96340 58359c 82 API calls __wsopen_s 96327->96340 96329->96289 96330 511f6f 348 API calls 96330->96331 96331->96311 96331->96327 96331->96329 96331->96330 96332 561b7f 96331->96332 96334 561b5d 96331->96334 96339 58359c 82 API calls __wsopen_s 96332->96339 96338 58359c 82 API calls __wsopen_s 96334->96338 96336->96290 96337->96331 96338->96329 96339->96329 96340->96329 96341->96306 96342->96308 96343 552402 96346 511410 96343->96346 96347 5524b8 DestroyWindow 96346->96347 96348 51144f mciSendStringW 96346->96348 96360 5524c4 96347->96360 96349 5116c6 96348->96349 96350 51146b 96348->96350 96349->96350 96352 5116d5 UnregisterHotKey 96349->96352 96351 511479 96350->96351 96350->96360 96379 51182e 96351->96379 96352->96349 96355 552509 96361 55251c FreeLibrary 96355->96361 96362 55252d 96355->96362 96356 5524e2 FindClose 96356->96360 96357 5524d8 96357->96360 96385 516246 CloseHandle 96357->96385 96359 51148e 96359->96362 96365 51149c 96359->96365 96360->96355 96360->96356 96360->96357 96361->96355 96363 552541 VirtualFree 96362->96363 96370 511509 96362->96370 96363->96362 96364 5114f8 CoUninitialize 96364->96370 96365->96364 96366 511514 96368 511524 96366->96368 96367 552589 96372 552598 ISource 96367->96372 96386 5832eb 6 API calls ISource 96367->96386 96383 511944 VirtualFreeEx CloseHandle 96368->96383 96370->96366 96370->96367 96375 552627 96372->96375 96387 5764d4 22 API calls ISource 96372->96387 96374 51153a 96374->96372 96376 51161f 96374->96376 96375->96375 96376->96375 96384 511876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96376->96384 96378 5116c1 96381 51183b 96379->96381 96380 511480 96380->96355 96380->96359 96381->96380 96388 57702a 22 API calls 96381->96388 96383->96374 96384->96378 96385->96357 96386->96367 96387->96372 96388->96381 96389 511cad SystemParametersInfoW

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 389 5142de-51434d call 51a961 GetVersionExW call 516b57 394 553617-55362a 389->394 395 514353 389->395 397 55362b-55362f 394->397 396 514355-514357 395->396 398 553656 396->398 399 51435d-5143bc call 5193b2 call 5137a0 396->399 400 553631 397->400 401 553632-55363e 397->401 405 55365d-553660 398->405 418 5143c2-5143c4 399->418 419 5537df-5537e6 399->419 400->401 401->397 402 553640-553642 401->402 402->396 404 553648-55364f 402->404 404->394 407 553651 404->407 408 553666-5536a8 405->408 409 51441b-514435 GetCurrentProcess IsWow64Process 405->409 407->398 408->409 413 5536ae-5536b1 408->413 411 514494-51449a 409->411 412 514437 409->412 415 51443d-514449 411->415 412->415 416 5536b3-5536bd 413->416 417 5536db-5536e5 413->417 420 553824-553828 GetSystemInfo 415->420 421 51444f-51445e LoadLibraryA 415->421 422 5536bf-5536c5 416->422 423 5536ca-5536d6 416->423 425 5536e7-5536f3 417->425 426 5536f8-553702 417->426 418->405 424 5143ca-5143dd 418->424 427 553806-553809 419->427 428 5537e8 419->428 433 514460-51446e GetProcAddress 421->433 434 51449c-5144a6 GetSystemInfo 421->434 422->409 423->409 435 5143e3-5143e5 424->435 436 553726-55372f 424->436 425->409 429 553715-553721 426->429 430 553704-553710 426->430 431 5537f4-5537fc 427->431 432 55380b-55381a 427->432 437 5537ee 428->437 429->409 430->409 431->427 432->437 440 55381c-553822 432->440 433->434 441 514470-514474 GetNativeSystemInfo 433->441 442 514476-514478 434->442 443 55374d-553762 435->443 444 5143eb-5143ee 435->444 438 553731-553737 436->438 439 55373c-553748 436->439 437->431 438->409 439->409 440->431 441->442 449 514481-514493 442->449 450 51447a-51447b FreeLibrary 442->450 447 553764-55376a 443->447 448 55376f-55377b 443->448 445 553791-553794 444->445 446 5143f4-51440f 444->446 445->409 453 55379a-5537c1 445->453 451 514415 446->451 452 553780-55378c 446->452 447->409 448->409 450->449 451->409 452->409 454 5537c3-5537c9 453->454 455 5537ce-5537da 453->455 454->409 455->409
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetVersionExW.KERNEL32(?), ref: 0051430D
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(?,005ACB64,00000000,?,?), ref: 00514422
                                                                                                                                                                                                                                  • IsWow64Process.KERNEL32(00000000,?,?), ref: 00514429
                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00514454
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00514466
                                                                                                                                                                                                                                  • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00514474
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 0051447B
                                                                                                                                                                                                                                  • GetSystemInfo.KERNEL32(?,?,?), ref: 005144A0
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                  • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                  • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                  • Opcode ID: 9c8305d5dcf685a4b0f12ecb36f2286912806a6685b9f5acf30200da6524060d
                                                                                                                                                                                                                                  • Instruction ID: ac8a0bbb934b3f79df29d2195ded40d43c13280d5240523b76426081269d0183
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9c8305d5dcf685a4b0f12ecb36f2286912806a6685b9f5acf30200da6524060d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7FA1E47190AAC0CFDB19C7697CC01D97FA57B3E780B285C99D4C59BA22D2704A4CEB39

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 793 5142a2-5142ba CreateStreamOnHGlobal 794 5142da-5142dd 793->794 795 5142bc-5142d3 FindResourceExW 793->795 796 5142d9 795->796 797 5535ba-5535c9 LoadResource 795->797 796->794 797->796 798 5535cf-5535dd SizeofResource 797->798 798->796 799 5535e3-5535ee LockResource 798->799 799->796 800 5535f4-553612 799->800 800->796
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,005150AA,?,?,00000000,00000000), ref: 005142B2
                                                                                                                                                                                                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005150AA,?,?,00000000,00000000), ref: 005142C9
                                                                                                                                                                                                                                  • LoadResource.KERNEL32(?,00000000,?,?,005150AA,?,?,00000000,00000000,?,?,?,?,?,?,00514F20), ref: 005535BE
                                                                                                                                                                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,005150AA,?,?,00000000,00000000,?,?,?,?,?,?,00514F20), ref: 005535D3
                                                                                                                                                                                                                                  • LockResource.KERNEL32(005150AA,?,?,005150AA,?,?,00000000,00000000,?,?,?,?,?,?,00514F20,?), ref: 005535E6
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                  • String ID: SCRIPT
                                                                                                                                                                                                                                  • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                  • Opcode ID: 48154616b0d3bdbeceac9f668d8d361e85e1801ac70b02415dabd46cd6e3cbc2
                                                                                                                                                                                                                                  • Instruction ID: e5e0dc8853f89fc7c25ddc1ad19a9260f9aa9c733a047f7e9c79c4dffda4c798
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 48154616b0d3bdbeceac9f668d8d361e85e1801ac70b02415dabd46cd6e3cbc2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B6117C78200701BFE7218B65DC48F677FBAFFD6B51F108169B41296250DB71D8449A20

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00512B6B
                                                                                                                                                                                                                                    • Part of subcall function 00513A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,005E1418,?,00512E7F,?,?,?,00000000), ref: 00513A78
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • GetForegroundWindow.USER32(runas,?,?,?,?,?,005D2224), ref: 00552C10
                                                                                                                                                                                                                                  • ShellExecuteW.SHELL32(00000000,?,?,005D2224), ref: 00552C17
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                                  • String ID: runas
                                                                                                                                                                                                                                  • API String ID: 448630720-4000483414
                                                                                                                                                                                                                                  • Opcode ID: 49a78bd8dfd4f7d67803ca02ab566bcddb0a5423d608a0b6cc5200ef0ed917e9
                                                                                                                                                                                                                                  • Instruction ID: f702cb7e64c365209b1356b3a388479cdc678667a0ed7ac8af206a66260bd42c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 49a78bd8dfd4f7d67803ca02ab566bcddb0a5423d608a0b6cc5200ef0ed917e9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C411E7311083426AEB14FF20D8699FD7FA4BFE1351F04082EF182421A2CF318AC9D712

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 1239 57d4dc-57d524 CreateToolhelp32Snapshot Process32FirstW call 57def7 1242 57d5d2-57d5d5 1239->1242 1243 57d5db-57d5ea CloseHandle 1242->1243 1244 57d529-57d538 Process32NextW 1242->1244 1244->1243 1245 57d53e-57d5ad call 51a961 * 2 call 519cb3 call 51525f call 51988f call 516350 call 52ce60 1244->1245 1260 57d5b7-57d5be 1245->1260 1261 57d5af-57d5b1 1245->1261 1263 57d5c0-57d5cd call 51988f * 2 1260->1263 1262 57d5b3-57d5b5 1261->1262 1261->1263 1262->1260 1262->1263 1263->1242
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0057D501
                                                                                                                                                                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0057D50F
                                                                                                                                                                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0057D52F
                                                                                                                                                                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 0057D5DC
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 420147892-0
                                                                                                                                                                                                                                  • Opcode ID: 48295adde6f564ff33f5dd67e6fe03865055bdf0c57b277dc5e1292b29985055
                                                                                                                                                                                                                                  • Instruction ID: 0cbd07d4ea5bc414d7b2edae0afe1046bfdd6431b579897f7af5bc7426a4cc97
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 48295adde6f564ff33f5dd67e6fe03865055bdf0c57b277dc5e1292b29985055
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2D318D71108301AFD301EF54D885AAFBFF8BFD9344F10492DF585821A1EB719988DBA2

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 1267 57dbbe-57dbda lstrlenW 1268 57dc06 1267->1268 1269 57dbdc-57dbe6 GetFileAttributesW 1267->1269 1270 57dc09-57dc0d 1268->1270 1269->1270 1271 57dbe8-57dbf7 FindFirstFileW 1269->1271 1271->1268 1272 57dbf9-57dc04 FindClose 1271->1272 1272->1270
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,00555222), ref: 0057DBCE
                                                                                                                                                                                                                                  • GetFileAttributesW.KERNELBASE(?), ref: 0057DBDD
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0057DBEE
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0057DBFA
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2695905019-0
                                                                                                                                                                                                                                  • Opcode ID: d667dd7003aae2d823655a1aedfb75caaccad058711674bbbda24ed44d2af4e7
                                                                                                                                                                                                                                  • Instruction ID: f0e16c42470e8858e4035df2d2e7cfdca5165d8050b9322c8c5084dd2548bc3d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d667dd7003aae2d823655a1aedfb75caaccad058711674bbbda24ed44d2af4e7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 36F0A0308109105783216B78AC0D8AA3FBCAF42334B108702F87AC20E0EBB05D58EAA5
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(005428E9,?,00534CBE,005428E9,005D88B8,0000000C,00534E15,005428E9,00000002,00000000,?,005428E9), ref: 00534D09
                                                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,?,00534CBE,005428E9,005D88B8,0000000C,00534E15,005428E9,00000002,00000000,?,005428E9), ref: 00534D10
                                                                                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 00534D22
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1703294689-0
                                                                                                                                                                                                                                  • Opcode ID: 82bd4bc6b819be00dd79d5582f8343fdd539c6cf3c8a409646c44832efbf5928
                                                                                                                                                                                                                                  • Instruction ID: ecd0645cbbe328e136bc984cf64a200a30c7cdb28f7f02806e61409061b09998
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 82bd4bc6b819be00dd79d5582f8343fdd539c6cf3c8a409646c44832efbf5928
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2FE0B631000149ABCF11AF54DD09A593F69FB92785F104814FC059A132CB35ED46DE80
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: BuffCharUpper
                                                                                                                                                                                                                                  • String ID: p#^
                                                                                                                                                                                                                                  • API String ID: 3964851224-2580200144
                                                                                                                                                                                                                                  • Opcode ID: 7dd490e0c8edbb3dddce27cb520b6bcb7073bcd442c33e188c322816136524ea
                                                                                                                                                                                                                                  • Instruction ID: 180d47d191b079c4de38bfffd8ad49dc2cea871e64a4e535c356fef6e14eddb3
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7dd490e0c8edbb3dddce27cb520b6bcb7073bcd442c33e188c322816136524ea
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0DA26B706083419FD714DF18C484B6ABFE1BF89304F14896DE89A9B392D772EC85CB92

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 0 59aff9-59b056 call 532340 3 59b058-59b06b call 51b567 0->3 4 59b094-59b098 0->4 14 59b0c8 3->14 15 59b06d-59b092 call 51b567 * 2 3->15 5 59b09a-59b0bb call 51b567 * 2 4->5 6 59b0dd-59b0e0 4->6 29 59b0bf-59b0c4 5->29 10 59b0e2-59b0e5 6->10 11 59b0f5-59b119 call 517510 call 517620 6->11 16 59b0e8-59b0ed call 51b567 10->16 31 59b1d8-59b1e0 11->31 32 59b11f-59b178 call 517510 call 517620 call 517510 call 517620 call 517510 call 517620 11->32 19 59b0cb-59b0cf 14->19 15->29 16->11 24 59b0d9-59b0db 19->24 25 59b0d1-59b0d7 19->25 24->6 24->11 25->16 29->6 33 59b0c6 29->33 36 59b20a-59b238 GetCurrentDirectoryW call 52fe0b GetCurrentDirectoryW 31->36 37 59b1e2-59b1fd call 517510 call 517620 31->37 80 59b17a-59b195 call 517510 call 517620 32->80 81 59b1a6-59b1d6 GetSystemDirectoryW call 52fe0b GetSystemDirectoryW 32->81 33->19 46 59b23c 36->46 37->36 50 59b1ff-59b208 call 534963 37->50 49 59b240-59b244 46->49 52 59b275-59b285 call 5800d9 49->52 53 59b246-59b270 call 519c6e * 3 49->53 50->36 50->52 62 59b28b-59b2e1 call 5807c0 call 5806e6 call 5805a7 52->62 63 59b287-59b289 52->63 53->52 66 59b2ee-59b2f2 62->66 99 59b2e3 62->99 63->66 73 59b2f8-59b321 call 5711c8 66->73 74 59b39a-59b3be CreateProcessW 66->74 84 59b32a call 5714ce 73->84 85 59b323-59b328 call 571201 73->85 77 59b3c1-59b3d4 call 52fe14 * 2 74->77 103 59b42f-59b43d CloseHandle 77->103 104 59b3d6-59b3e8 77->104 80->81 107 59b197-59b1a0 call 534963 80->107 81->46 98 59b32f-59b33c call 534963 84->98 85->98 115 59b33e-59b345 98->115 116 59b347-59b357 call 534963 98->116 99->66 109 59b49c 103->109 110 59b43f-59b444 103->110 105 59b3ea 104->105 106 59b3ed-59b3fc 104->106 105->106 111 59b3fe 106->111 112 59b401-59b42a GetLastError call 51630c call 51cfa0 106->112 107->49 107->81 113 59b4a0-59b4a4 109->113 117 59b451-59b456 110->117 118 59b446-59b44c CloseHandle 110->118 111->112 127 59b4e5-59b4f6 call 580175 112->127 120 59b4b2-59b4bc 113->120 121 59b4a6-59b4b0 113->121 115->115 115->116 137 59b359-59b360 116->137 138 59b362-59b372 call 534963 116->138 124 59b458-59b45e CloseHandle 117->124 125 59b463-59b468 117->125 118->117 128 59b4be 120->128 129 59b4c4-59b4e3 call 51cfa0 CloseHandle 120->129 121->127 124->125 131 59b46a-59b470 CloseHandle 125->131 132 59b475-59b49a call 5809d9 call 59b536 125->132 128->129 129->127 131->132 132->113 137->137 137->138 146 59b37d-59b398 call 52fe14 * 3 138->146 147 59b374-59b37b 138->147 146->77 147->146 147->147
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0059B198
                                                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0059B1B0
                                                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0059B1D4
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0059B200
                                                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0059B214
                                                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0059B236
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0059B332
                                                                                                                                                                                                                                    • Part of subcall function 005805A7: GetStdHandle.KERNEL32(000000F6), ref: 005805C6
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0059B34B
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0059B366
                                                                                                                                                                                                                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0059B3B6
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000), ref: 0059B407
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 0059B439
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0059B44A
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0059B45C
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0059B46E
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 0059B4E3
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2178637699-0
                                                                                                                                                                                                                                  • Opcode ID: 0b706b2a19a7e54609a7850193680910caea8f92db3ea7e1b13ba4e475b714b5
                                                                                                                                                                                                                                  • Instruction ID: 22fa9e0d10ca38dedbe654ad8102f7799fe74ffb57dea26696b9a8f2fa066a33
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0b706b2a19a7e54609a7850193680910caea8f92db3ea7e1b13ba4e475b714b5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 20F189316043019FEB14EF24D999B6ABFE5BF85310F14895DF8899B2A2DB31EC44CB52
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetInputState.USER32 ref: 0051D807
                                                                                                                                                                                                                                  • timeGetTime.WINMM ref: 0051DA07
                                                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0051DB28
                                                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 0051DB7B
                                                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 0051DB89
                                                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0051DB9F
                                                                                                                                                                                                                                  • Sleep.KERNELBASE(0000000A), ref: 0051DBB1
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2189390790-0
                                                                                                                                                                                                                                  • Opcode ID: 176867f16ce7f37b8c0371c1b5fc6cdafdbdf558ea362d9fc6ffc227b7685206
                                                                                                                                                                                                                                  • Instruction ID: fd57dc7d5e94747b1b16466e0e835fa13b7976316c91f25d005dd059956decd9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 176867f16ce7f37b8c0371c1b5fc6cdafdbdf558ea362d9fc6ffc227b7685206
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EE42C5706087429FE728CF24C888BAABFF4BF95304F14495DE4958B291D774E884DFA2

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00512D07
                                                                                                                                                                                                                                  • RegisterClassExW.USER32(00000030), ref: 00512D31
                                                                                                                                                                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00512D42
                                                                                                                                                                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00512D5F
                                                                                                                                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00512D6F
                                                                                                                                                                                                                                  • LoadIconW.USER32(000000A9), ref: 00512D85
                                                                                                                                                                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00512D94
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                  • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                  • Opcode ID: 05a03a51e42841c1cd0665a3e8ae9cb0c71c7fa4468e5983488920ca7cf30ad6
                                                                                                                                                                                                                                  • Instruction ID: f143d0c6b0c80f3b561a8e98a00846a8f3dcc9a9066f4841c4aa78f998568ed5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 05a03a51e42841c1cd0665a3e8ae9cb0c71c7fa4468e5983488920ca7cf30ad6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F021E3B5901258AFDB00DFA4E889BDDBFB4FB19700F00811AF551EA2A0D7B50548EFA4

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 457 55065b-55068b call 55042f 460 5506a6-5506b2 call 545221 457->460 461 55068d-550698 call 53f2c6 457->461 466 5506b4-5506c9 call 53f2c6 call 53f2d9 460->466 467 5506cb-550714 call 55039a 460->467 468 55069a-5506a1 call 53f2d9 461->468 466->468 477 550716-55071f 467->477 478 550781-55078a GetFileType 467->478 475 55097d-550983 468->475 482 550756-55077c GetLastError call 53f2a3 477->482 483 550721-550725 477->483 479 5507d3-5507d6 478->479 480 55078c-5507bd GetLastError call 53f2a3 CloseHandle 478->480 486 5507df-5507e5 479->486 487 5507d8-5507dd 479->487 480->468 494 5507c3-5507ce call 53f2d9 480->494 482->468 483->482 488 550727-550754 call 55039a 483->488 491 5507e9-550837 call 54516a 486->491 492 5507e7 486->492 487->491 488->478 488->482 499 550847-55086b call 55014d 491->499 500 550839-550845 call 5505ab 491->500 492->491 494->468 507 55086d 499->507 508 55087e-5508c1 499->508 500->499 506 55086f-550879 call 5486ae 500->506 506->475 507->506 510 5508c3-5508c7 508->510 511 5508e2-5508f0 508->511 510->511 513 5508c9-5508dd 510->513 514 5508f6-5508fa 511->514 515 55097b 511->515 513->511 514->515 516 5508fc-55092f CloseHandle call 55039a 514->516 515->475 519 550931-55095d GetLastError call 53f2a3 call 545333 516->519 520 550963-550977 516->520 519->520 520->515
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0055039A: CreateFileW.KERNELBASE(00000000,00000000,?,00550704,?,?,00000000,?,00550704,00000000,0000000C), ref: 005503B7
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0055076F
                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00550776
                                                                                                                                                                                                                                  • GetFileType.KERNELBASE(00000000), ref: 00550782
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0055078C
                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00550795
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005507B5
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 005508FF
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00550931
                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00550938
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                  • String ID: H
                                                                                                                                                                                                                                  • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                  • Opcode ID: d391549f42ad372cd4da605374c614e6c34598012bd20f1ceba67b5255ef5fab
                                                                                                                                                                                                                                  • Instruction ID: 86c9dab704b1307408f9815d7b70e31a8ce6c6967f8c5cd898817c4fe478aa28
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d391549f42ad372cd4da605374c614e6c34598012bd20f1ceba67b5255ef5fab
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7DA14636A101058FDF19AF68DCA5BAE3FA0FB46321F14115AFC119F2D1DB31981ADB91

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00513A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,005E1418,?,00512E7F,?,?,?,00000000), ref: 00513A78
                                                                                                                                                                                                                                    • Part of subcall function 00513357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00513379
                                                                                                                                                                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0051356A
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0055318D
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 005531CE
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00553210
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00553277
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00553286
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                  • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                  • Opcode ID: 59ba445b5f2aeb59a8a8ecd0324b3528bd4cf2b228c2e376edbf35032a3dc23b
                                                                                                                                                                                                                                  • Instruction ID: 92f4a2eb1b32ecace75e30f4bbb629a098089ed271d80905e5beff44e7be68d5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 59ba445b5f2aeb59a8a8ecd0324b3528bd4cf2b228c2e376edbf35032a3dc23b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 23716D714043419ED318DF65DC969ABBFE8BF99740F40082EF585871A4EB709A88DF61

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00512B8E
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00512B9D
                                                                                                                                                                                                                                  • LoadIconW.USER32(00000063), ref: 00512BB3
                                                                                                                                                                                                                                  • LoadIconW.USER32(000000A4), ref: 00512BC5
                                                                                                                                                                                                                                  • LoadIconW.USER32(000000A2), ref: 00512BD7
                                                                                                                                                                                                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00512BEF
                                                                                                                                                                                                                                  • RegisterClassExW.USER32(?), ref: 00512C40
                                                                                                                                                                                                                                    • Part of subcall function 00512CD4: GetSysColorBrush.USER32(0000000F), ref: 00512D07
                                                                                                                                                                                                                                    • Part of subcall function 00512CD4: RegisterClassExW.USER32(00000030), ref: 00512D31
                                                                                                                                                                                                                                    • Part of subcall function 00512CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00512D42
                                                                                                                                                                                                                                    • Part of subcall function 00512CD4: InitCommonControlsEx.COMCTL32(?), ref: 00512D5F
                                                                                                                                                                                                                                    • Part of subcall function 00512CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00512D6F
                                                                                                                                                                                                                                    • Part of subcall function 00512CD4: LoadIconW.USER32(000000A9), ref: 00512D85
                                                                                                                                                                                                                                    • Part of subcall function 00512CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00512D94
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                  • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                  • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                  • Opcode ID: c8c7ba3d9ffbf7dad13689c7b0c4d9a9b61d5d69ee38b5dec210e6b8c6c1a51e
                                                                                                                                                                                                                                  • Instruction ID: ab420cb404ae0d20ee839d5fdab40278d11b92ac88542dcbe3edf1425b223d21
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c8c7ba3d9ffbf7dad13689c7b0c4d9a9b61d5d69ee38b5dec210e6b8c6c1a51e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 90216A70E00358AFDB149FA5EC89AAD7FF4FB1CB50F00041AE580AA7A0D3B10548EF88

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 598 513170-513185 599 5131e5-5131e7 598->599 600 513187-51318a 598->600 599->600 601 5131e9 599->601 602 5131eb 600->602 603 51318c-513193 600->603 604 5131d0-5131d8 DefWindowProcW 601->604 605 5131f1-5131f6 602->605 606 552dfb-552e23 call 5118e2 call 52e499 602->606 607 513265-51326d PostQuitMessage 603->607 608 513199-51319e 603->608 614 5131de-5131e4 604->614 609 5131f8-5131fb 605->609 610 51321d-513244 SetTimer RegisterWindowMessageW 605->610 644 552e28-552e2f 606->644 615 513219-51321b 607->615 612 5131a4-5131a8 608->612 613 552e7c-552e90 call 57bf30 608->613 616 513201-51320f KillTimer call 5130f2 609->616 617 552d9c-552d9f 609->617 610->615 619 513246-513251 CreatePopupMenu 610->619 620 552e68-552e72 call 57c161 612->620 621 5131ae-5131b3 612->621 613->615 639 552e96 613->639 615->614 634 513214 call 513c50 616->634 623 552dd7-552df6 MoveWindow 617->623 624 552da1-552da5 617->624 619->615 635 552e77 620->635 628 552e4d-552e54 621->628 629 5131b9-5131be 621->629 623->615 631 552da7-552daa 624->631 632 552dc6-552dd2 SetFocus 624->632 628->604 633 552e5a-552e63 call 570ad7 628->633 637 513253-513263 call 51326f 629->637 638 5131c4-5131ca 629->638 631->638 640 552db0-552dc1 call 5118e2 631->640 632->615 633->604 634->615 635->615 637->615 638->604 638->644 639->604 640->615 644->604 648 552e35-552e48 call 5130f2 call 513837 644->648 648->604
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0051316A,?,?), ref: 005131D8
                                                                                                                                                                                                                                  • KillTimer.USER32(?,00000001,?,?,?,?,?,0051316A,?,?), ref: 00513204
                                                                                                                                                                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00513227
                                                                                                                                                                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0051316A,?,?), ref: 00513232
                                                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 00513246
                                                                                                                                                                                                                                  • PostQuitMessage.USER32(00000000), ref: 00513267
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                  • String ID: TaskbarCreated
                                                                                                                                                                                                                                  • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                  • Opcode ID: 50daae57c2c84d453a3c3aba6bdf7661dea9d7be9e4876375b55130b2d6c7345
                                                                                                                                                                                                                                  • Instruction ID: 2ab847bb1c256f8f2e4315ca530101497210aa3205ea15995f18b23dfea5c71b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 50daae57c2c84d453a3c3aba6bdf7661dea9d7be9e4876375b55130b2d6c7345
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E7414939240644B7FB186B78DC7DBFD3E59F756340F04052AF9528A1A1CB708AC8E7A5

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 654 511410-511449 655 5524b8-5524b9 DestroyWindow 654->655 656 51144f-511465 mciSendStringW 654->656 659 5524c4-5524d1 655->659 657 5116c6-5116d3 656->657 658 51146b-511473 656->658 661 5116d5-5116f0 UnregisterHotKey 657->661 662 5116f8-5116ff 657->662 658->659 660 511479-511488 call 51182e 658->660 666 552500-552507 659->666 667 5524d3-5524d6 659->667 674 55250e-55251a 660->674 675 51148e-511496 660->675 661->662 664 5116f2-5116f3 call 5110d0 661->664 662->658 665 511705 662->665 664->662 665->657 666->659 670 552509 666->670 671 5524e2-5524e5 FindClose 667->671 672 5524d8-5524e0 call 516246 667->672 670->674 676 5524eb-5524f8 671->676 672->676 681 552524-55252b 674->681 682 55251c-55251e FreeLibrary 674->682 678 552532-55253f 675->678 679 51149c-5114c1 call 51cfa0 675->679 676->666 680 5524fa-5524fb call 5832b1 676->680 686 552566-55256d 678->686 687 552541-55255e VirtualFree 678->687 692 5114c3 679->692 693 5114f8-511503 CoUninitialize 679->693 680->666 681->674 685 55252d 681->685 682->681 685->678 686->678 689 55256f 686->689 687->686 688 552560-552561 call 583317 687->688 688->686 694 552574-552578 689->694 695 5114c6-5114f6 call 511a05 call 5119ae 692->695 693->694 696 511509-51150e 693->696 694->696 697 55257e-552584 694->697 695->693 699 511514-51151e 696->699 700 552589-552596 call 5832eb 696->700 697->696 701 511524-5115a5 call 51988f call 511944 call 5117d5 call 52fe14 call 51177c call 51988f call 51cfa0 call 5117fe call 52fe14 699->701 702 511707-511714 call 52f80e 699->702 713 552598 700->713 717 55259d-5525bf call 52fdcd 701->717 743 5115ab-5115cf call 52fe14 701->743 702->701 715 51171a 702->715 713->717 715->702 722 5525c1 717->722 725 5525c6-5525e8 call 52fdcd 722->725 731 5525ea 725->731 734 5525ef-552611 call 52fdcd 731->734 741 552613 734->741 744 552618-552625 call 5764d4 741->744 743->725 750 5115d5-5115f9 call 52fe14 743->750 749 552627 744->749 752 55262c-552639 call 52ac64 749->752 750->734 755 5115ff-511619 call 52fe14 750->755 758 55263b 752->758 755->744 760 51161f-511643 call 5117d5 call 52fe14 755->760 761 552640-55264d call 583245 758->761 760->752 769 511649-511651 760->769 768 55264f 761->768 771 552654-552661 call 5832cc 768->771 769->761 770 511657-511675 call 51988f call 51190a 769->770 770->771 780 51167b-511689 770->780 777 552663 771->777 779 552668-552675 call 5832cc 777->779 785 552677 779->785 780->779 782 51168f-5116c5 call 51988f * 3 call 511876 780->782 785->785
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00511459
                                                                                                                                                                                                                                  • CoUninitialize.COMBASE ref: 005114F8
                                                                                                                                                                                                                                  • UnregisterHotKey.USER32(?), ref: 005116DD
                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 005524B9
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?), ref: 0055251E
                                                                                                                                                                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0055254B
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                  • String ID: close all
                                                                                                                                                                                                                                  • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                  • Opcode ID: 4c7284e9177615424abd33aea7964d3098e44775fd7943789c732cef821113a9
                                                                                                                                                                                                                                  • Instruction ID: 6868d8ac1e200b6f10c86dff4f2ce615e05f25ca166e739ad64f0d328634d7ee
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4c7284e9177615424abd33aea7964d3098e44775fd7943789c732cef821113a9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4AD1BD31701622CFEB19EF14D4A8A69FFA4BF46700F1441EEE94A6B252DB30AC56CF54

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 803 512c63-512cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00512C91
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00512CB2
                                                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,00511CAD,?), ref: 00512CC6
                                                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,00511CAD,?), ref: 00512CCF
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$CreateShow
                                                                                                                                                                                                                                  • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                  • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                  • Opcode ID: 89165a7c98567d1cc41c631086db311e900b2983ca30c5ee3e8e3083fefe8e11
                                                                                                                                                                                                                                  • Instruction ID: b78191da6a19a4070b5bd1660b6506e9f4f27e897899a2873503c4c8845f81f5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 89165a7c98567d1cc41c631086db311e900b2983ca30c5ee3e8e3083fefe8e11
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1FF03A755402D07EEB300713AC88E773EBDE7EBF50B00045EF940AA5A0C6711848EAB8

                                                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                                                  control_flow_graph 1228 513b1c-513b27 1229 513b99-513b9b 1228->1229 1230 513b29-513b2e 1228->1230 1232 513b8c-513b8f 1229->1232 1230->1229 1231 513b30-513b48 RegOpenKeyExW 1230->1231 1231->1229 1233 513b4a-513b69 RegQueryValueExW 1231->1233 1234 513b80-513b8b RegCloseKey 1233->1234 1235 513b6b-513b76 1233->1235 1234->1232 1236 513b90-513b97 1235->1236 1237 513b78-513b7a 1235->1237 1238 513b7e 1236->1238 1237->1238 1238->1234
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00513B0F,SwapMouseButtons,00000004,?), ref: 00513B40
                                                                                                                                                                                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00513B0F,SwapMouseButtons,00000004,?), ref: 00513B61
                                                                                                                                                                                                                                  • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00513B0F,SwapMouseButtons,00000004,?), ref: 00513B83
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                  • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                  • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                  • Opcode ID: 319631d09ed959d626de6772052e70475460ae4af12e77f925a05db88f3ffe56
                                                                                                                                                                                                                                  • Instruction ID: 09d53879e9682ef28836425b54e2f20288d6eab53c977c5ae174cfe8191ab0fe
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 319631d09ed959d626de6772052e70475460ae4af12e77f925a05db88f3ffe56
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 35112AB5514208FFEB208FA5DC58AEFBBB8FF05744B104859A805D7110E2319E84A760
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 005533A2
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00513A04
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                  • String ID: Line:
                                                                                                                                                                                                                                  • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                                  • Opcode ID: 47bd41e12cc419c588fbe870e997675488a2467051a2eb6f987f2f57f525150a
                                                                                                                                                                                                                                  • Instruction ID: 37012539bff7429e0e1a0e8109a5fc8a43f79459d6da61c8ef5df5daa4e78fbd
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 47bd41e12cc419c588fbe870e997675488a2467051a2eb6f987f2f57f525150a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2431E271408301AAE325EB20DC59BEBBFD8BF94710F100D2AF59993091EB709688C7C6
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 00552C8C
                                                                                                                                                                                                                                    • Part of subcall function 00513AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00513A97,?,?,00512E7F,?,?,?,00000000), ref: 00513AC2
                                                                                                                                                                                                                                    • Part of subcall function 00512DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00512DC4
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                  • String ID: X$`e]
                                                                                                                                                                                                                                  • API String ID: 779396738-2761306869
                                                                                                                                                                                                                                  • Opcode ID: 233d51a63626955e37975bd671959e772abcd52637bf02909dccb5e526c68677
                                                                                                                                                                                                                                  • Instruction ID: 6c7f1b1fc690e06ec670124cc7bb6c773e2ca169bf0c90e93474dc7d2e786c83
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 233d51a63626955e37975bd671959e772abcd52637bf02909dccb5e526c68677
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 64218171A002589BDB41DF98D849BEE7FF8BF89305F00405AE405A7241DBB45A898F61
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00530668
                                                                                                                                                                                                                                    • Part of subcall function 005332A4: RaiseException.KERNEL32(?,?,?,0053068A,?,005E1444,?,?,?,?,?,?,0053068A,00511129,005D8738,00511129), ref: 00533304
                                                                                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00530685
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                  • String ID: Unknown exception
                                                                                                                                                                                                                                  • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                  • Opcode ID: c71999923d2a1515696546d23750eedc3b54cedce785c4248cf2589d742347fa
                                                                                                                                                                                                                                  • Instruction ID: 330f89fbd2b33b6d71b1ab31fef8c90d072caeb2ce816210f737f1f86866d3d9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c71999923d2a1515696546d23750eedc3b54cedce785c4248cf2589d742347fa
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DEF0C23490030E77CF00B6A8E85AC9E7F7CBE81310F604532B824D65D5EF71EA65CA80
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00511BF4
                                                                                                                                                                                                                                    • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00511BFC
                                                                                                                                                                                                                                    • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00511C07
                                                                                                                                                                                                                                    • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00511C12
                                                                                                                                                                                                                                    • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00511C1A
                                                                                                                                                                                                                                    • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00511C22
                                                                                                                                                                                                                                    • Part of subcall function 00511B4A: RegisterWindowMessageW.USER32(00000004,?,005112C4), ref: 00511BA2
                                                                                                                                                                                                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0051136A
                                                                                                                                                                                                                                  • OleInitialize.OLE32 ref: 00511388
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,00000000), ref: 005524AB
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1986988660-0
                                                                                                                                                                                                                                  • Opcode ID: d9f1934d5bc0c945d4157bae68404e77a2955491e444033d96acdde581ce522f
                                                                                                                                                                                                                                  • Instruction ID: a2c1be7d9bad3e72d67d319451dd2cef8a1051d32bf9687fd9b9a2537118ac49
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d9f1934d5bc0c945d4157bae68404e77a2955491e444033d96acdde581ce522f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8F71C1B5905B818ED78CDF79A9C56993EE0FBA9340744416BD08ACF3A1EB304488EF4D
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00513923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00513A04
                                                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0057C259
                                                                                                                                                                                                                                  • KillTimer.USER32(?,00000001,?,?), ref: 0057C261
                                                                                                                                                                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0057C270
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3500052701-0
                                                                                                                                                                                                                                  • Opcode ID: 84e430f0ea7d7c3f3f44777c474e6665588b1047e38d15e98f6fc299fc65fdcc
                                                                                                                                                                                                                                  • Instruction ID: 8268c38520dea522e2ad6d0c6ea99744c00fa1bb3e7c6e7c4814fcfdb04259e6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 84e430f0ea7d7c3f3f44777c474e6665588b1047e38d15e98f6fc299fc65fdcc
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9C31C574904744AFEB22CF64A895BEBBFECAB17304F00449DD2DE97242C7745A88DB51
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,005485CC,?,005D8CC8,0000000C), ref: 00548704
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,005485CC,?,005D8CC8,0000000C), ref: 0054870E
                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00548739
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2583163307-0
                                                                                                                                                                                                                                  • Opcode ID: 13746a9286d7fc3804120b1d10a8ee9d0988eada42a7bdc636fafadc96d8caf8
                                                                                                                                                                                                                                  • Instruction ID: ca96c30c1691fcba0cd7422c8e6215f49d8d2d32e340fa7d64285d3245ada209
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 13746a9286d7fc3804120b1d10a8ee9d0988eada42a7bdc636fafadc96d8caf8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E0018E33A0426027D6A56B346889BFE2F59BBE277CF3A0519F8148B1D3EEB1CC819150
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 0051DB7B
                                                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 0051DB89
                                                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0051DB9F
                                                                                                                                                                                                                                  • Sleep.KERNELBASE(0000000A), ref: 0051DBB1
                                                                                                                                                                                                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 00561CC9
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3288985973-0
                                                                                                                                                                                                                                  • Opcode ID: 63e18fd78ce78f31ea2fdcd4028c3206ac68d47b68e7d8c617a6442931273816
                                                                                                                                                                                                                                  • Instruction ID: b04c57b5133ee7231b73540fc7dc41ed18e125d81c195027c2f3adf0a976cd47
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 63e18fd78ce78f31ea2fdcd4028c3206ac68d47b68e7d8c617a6442931273816
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DBF05E306483809BFB34CB608C89FEA7BBCFB95310F104918E64A830C0DB30A488DB29
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 005217F6
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Init_thread_footer
                                                                                                                                                                                                                                  • String ID: CALL
                                                                                                                                                                                                                                  • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                  • Opcode ID: 9aa9c627c0e30c51fe95d81123e822f8cad44c652a0d19d8a0e93417bfadfe1f
                                                                                                                                                                                                                                  • Instruction ID: 6634c6f1f2c92b9a7d328588e81a4e2057efe7602474ce4a2ff8a8cee2b1219c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9aa9c627c0e30c51fe95d81123e822f8cad44c652a0d19d8a0e93417bfadfe1f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9422AB706086529FC714DF14E484A2BBFF1BFA6314F18896DF4868B3A2D731E845CB86
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00513908
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: IconNotifyShell_
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1144537725-0
                                                                                                                                                                                                                                  • Opcode ID: 733028056f64d79adee4306f92ca461db6d2bdca87065f33659f66aaa9822bdc
                                                                                                                                                                                                                                  • Instruction ID: a3104f05ad26b2e79550cb6a0e322f9f8e9617fb0eba3216efbd6ecfaa37af3a
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 733028056f64d79adee4306f92ca461db6d2bdca87065f33659f66aaa9822bdc
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3D319C705057019FE720DF24D8947DBBFE8FB59708F00092EF99997240E771AA88DB56
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • timeGetTime.WINMM ref: 0052F661
                                                                                                                                                                                                                                    • Part of subcall function 0051D730: GetInputState.USER32 ref: 0051D807
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 0056F2DE
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4149333218-0
                                                                                                                                                                                                                                  • Opcode ID: 12a6b3d7e8acf3c36911949548642d6e51b677f8cb7934a2198f02dd5cec6bf1
                                                                                                                                                                                                                                  • Instruction ID: f6e850105bc36d4462306ecb572e2ca58b7f35d57296f5311e41e76973719d37
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 12a6b3d7e8acf3c36911949548642d6e51b677f8cb7934a2198f02dd5cec6bf1
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0CF082312402169FE310EF65E449B9ABFF5FF96760F000029E859C72A0EB70A840CF90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00544CDA: DeleteCriticalSection.KERNEL32(?,?,?,?,?,005D8BE8,00000010,0053914E), ref: 00544D3C
                                                                                                                                                                                                                                    • Part of subcall function 00544CDA: _free.LIBCMT ref: 00544D4A
                                                                                                                                                                                                                                    • Part of subcall function 00544D7A: _free.LIBCMT ref: 00544D9C
                                                                                                                                                                                                                                  • DeleteCriticalSection.KERNEL32(-00000020), ref: 0053916A
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0053917E
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free$CriticalDeleteSection
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1906768660-0
                                                                                                                                                                                                                                  • Opcode ID: da7ba2fb0cd321abb9cb5bf2034b1df6ccceb4e7ef82467be91efd9eeb3cb557
                                                                                                                                                                                                                                  • Instruction ID: 23b4227f49f28c5096c4a324655b8651faffd4550ae509d258c4b53196324264
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: da7ba2fb0cd321abb9cb5bf2034b1df6ccceb4e7ef82467be91efd9eeb3cb557
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 91E0D833C20450C7C7256BACFC896AD3BA8FB99318F091516F44457161CB616C859A44
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00514E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00514EDD,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E9C
                                                                                                                                                                                                                                    • Part of subcall function 00514E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00514EAE
                                                                                                                                                                                                                                    • Part of subcall function 00514E90: FreeLibrary.KERNEL32(00000000,?,?,00514EDD,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514EC0
                                                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514EFD
                                                                                                                                                                                                                                    • Part of subcall function 00514E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00553CDE,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E62
                                                                                                                                                                                                                                    • Part of subcall function 00514E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00514E74
                                                                                                                                                                                                                                    • Part of subcall function 00514E59: FreeLibrary.KERNEL32(00000000,?,?,00553CDE,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E87
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2632591731-0
                                                                                                                                                                                                                                  • Opcode ID: 7194d4866a79915ef8ec09aabf73dce4a15e9113ac754805e5119d69ab1afc96
                                                                                                                                                                                                                                  • Instruction ID: 48b0312ac32c550c80d4d31d0f05ca6639ee46fab9d83a75a2a14cdf16941df8
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7194d4866a79915ef8ec09aabf73dce4a15e9113ac754805e5119d69ab1afc96
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7111C431600206AAEF15AB60D81AFED7FA5BFC0711F10442AF542AA2D1EE719E85DB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: __wsopen_s
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3347428461-0
                                                                                                                                                                                                                                  • Opcode ID: 9d59626c12810cbc246622456b8a193d956298b931b56eeeb23c261f8471b7f1
                                                                                                                                                                                                                                  • Instruction ID: 618b61f8fe42da43e59964d0c08dde0c02aa4591aef5de213732375e3dde6d57
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9d59626c12810cbc246622456b8a193d956298b931b56eeeb23c261f8471b7f1
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5311257590410AAFCF09DF58E9449EE7BF8FF48308F144059F808AB352DA30DA118BA4
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00544C7D: RtlAllocateHeap.NTDLL(00000008,00511129,00000000,?,00542E29,00000001,00000364,?,?,?,0053F2DE,00543863,005E1444,?,0052FDF5,?), ref: 00544CBE
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054506C
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AllocateHeap_free
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 614378929-0
                                                                                                                                                                                                                                  • Opcode ID: 655a31e7387c1f28a70501aabde92791eb52eb4d5a70654cf98b1306b346947d
                                                                                                                                                                                                                                  • Instruction ID: faf7293bcd45e29fdd4cd395ffc8697be0ccd866822b4e37b3ecc14e7bffd585
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 655a31e7387c1f28a70501aabde92791eb52eb4d5a70654cf98b1306b346947d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 090126762047056BE3218E659889ADAFFE9FB89374F65051DE18883281EA30A805C6B4
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: b6648c02b6181a3054024c9e46e369ee253c9ce1af06010b8a4fd45ee0b60682
                                                                                                                                                                                                                                  • Instruction ID: 6c5e10eb16971aa7c5077b82ff950d0662c1c295916054eef83bed6e1020f663
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b6648c02b6181a3054024c9e46e369ee253c9ce1af06010b8a4fd45ee0b60682
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 57F02D32510A1597D7313A65AC0FB9B3FE8BFD2339F100719F424931D1CB70D80186A5
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000008,00511129,00000000,?,00542E29,00000001,00000364,?,?,?,0053F2DE,00543863,005E1444,?,0052FDF5,?), ref: 00544CBE
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                                                                                  • Opcode ID: b9e1522ed38326f20b62199e8f248f0d4790d6e57c2baea3e7d318970a886a16
                                                                                                                                                                                                                                  • Instruction ID: 4659401197991350d627ea968523f16c841bb239aadb1ac43c86834c658446de
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b9e1522ed38326f20b62199e8f248f0d4790d6e57c2baea3e7d318970a886a16
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 52F0E93168222567DB215F72AC8DBDB3F98BF917A9F1C4121BC15AA281CA30DC009EE0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                                                                                  • Opcode ID: 1fc77640f5bb0d2085960ab3dbfc0d280e7bce6a13504e8330d23459534c25dc
                                                                                                                                                                                                                                  • Instruction ID: 2f5f05b9be6bcdeb8d9d0c5cea27efbf4dca003c3cd192af6aa530af4a067f40
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1fc77640f5bb0d2085960ab3dbfc0d280e7bce6a13504e8330d23459534c25dc
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F9E02B3110322596D7312A779C04BDBBF49BF927B8F050030BC14965B0DB21ED019AE1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514F6D
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FreeLibrary
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3664257935-0
                                                                                                                                                                                                                                  • Opcode ID: 481e248888786dab5058cd4ea2bf296aa52614f0619bda266c4ebcc99ac3f866
                                                                                                                                                                                                                                  • Instruction ID: 2c9151721821c03295ce8f418c1f18d359c46c982612447c3d2c6a9ce3916412
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 481e248888786dab5058cd4ea2bf296aa52614f0619bda266c4ebcc99ac3f866
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B4F01571105792CFEB349F64E4948A2BFE4BF15329324997EE1EA86721C7319889DF10
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • IsWindow.USER32(00000000), ref: 005A2A66
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2353593579-0
                                                                                                                                                                                                                                  • Opcode ID: f5a5ce2487b24e0711a4b4f9e999c03bd242d5e58d26657475bc8d3cb6fd7a9e
                                                                                                                                                                                                                                  • Instruction ID: 3b6dae236ee1baa2f905901f1685248ec44deaee45dc9ab563c0c579abfe236a
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f5a5ce2487b24e0711a4b4f9e999c03bd242d5e58d26657475bc8d3cb6fd7a9e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9CE0DF32340116AEC710EA34EC859FE7F4CFB91390B004836AC2AD2100DB308985A6B0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000002,?), ref: 0051314E
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: IconNotifyShell_
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1144537725-0
                                                                                                                                                                                                                                  • Opcode ID: 87b0ec55f3cdf01ecdcbf0170f025b3bd1782a08a607d2e5f2d50353eb9ae2f5
                                                                                                                                                                                                                                  • Instruction ID: 2e44d64593e3ac06e3c001d16dcfa6b478f94b00ec6f1aa0d4b352e3687bc47e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 87b0ec55f3cdf01ecdcbf0170f025b3bd1782a08a607d2e5f2d50353eb9ae2f5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D2F0A7709003449FEB52DB24DC897D97FBCB705708F0000E5A18896181DB7047CCCF55
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00512DC4
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 541455249-0
                                                                                                                                                                                                                                  • Opcode ID: 1caff749c3c295e75cceea02674f4a6ab957183f92078c586c7744f08f545cca
                                                                                                                                                                                                                                  • Instruction ID: af6bb60d88b20b4a14c9e3f61be18ee2463dd605261ee7774c41c0eb110563f5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1caff749c3c295e75cceea02674f4a6ab957183f92078c586c7744f08f545cca
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B9E0CD766041245BC71092589C09FEA7BDDEFC8790F050071FD09D7248DA60AD848550
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00513837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00513908
                                                                                                                                                                                                                                    • Part of subcall function 0051D730: GetInputState.USER32 ref: 0051D807
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00512B6B
                                                                                                                                                                                                                                    • Part of subcall function 005130F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0051314E
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3667716007-0
                                                                                                                                                                                                                                  • Opcode ID: be89c227c4e0883328b459421ed61efdf47b788cea86a10d855fd3cb58fd9110
                                                                                                                                                                                                                                  • Instruction ID: 9e774b8ef3a567c51a5a47a9b086c4ec7cdf331ecb298829a5f51daef80eac61
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: be89c227c4e0883328b459421ed61efdf47b788cea86a10d855fd3cb58fd9110
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D3E0863130424617EB08BB75A86A5EDBF99BBE5351F40153EF182472A2CF658AC98352
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateFileW.KERNELBASE(00000000,00000000,?,00550704,?,?,00000000,?,00550704,00000000,0000000C), ref: 005503B7
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CreateFile
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 823142352-0
                                                                                                                                                                                                                                  • Opcode ID: 54f1aac22010cd729c72b798458b2d50dd5650f05d8a71586cfef900dec2cc58
                                                                                                                                                                                                                                  • Instruction ID: e3fdca1bd9b971a046894b3aa3ac286079517264a556a7e70bb7ea0c106ed27b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 54f1aac22010cd729c72b798458b2d50dd5650f05d8a71586cfef900dec2cc58
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8AD06C3214010DBBDF028F84DD06EDA3FAAFB48714F014000BE1856020C736E821EB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00511CBC
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: InfoParametersSystem
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3098949447-0
                                                                                                                                                                                                                                  • Opcode ID: 47ad4b8e05770eede9ba130daf9b36dba2778459329f13e8e9734d64e9f979a1
                                                                                                                                                                                                                                  • Instruction ID: c4d423dec8d936809a059062ce4fa6cb68b61af6229407aa99593c5eb325b763
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 47ad4b8e05770eede9ba130daf9b36dba2778459329f13e8e9734d64e9f979a1
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 96C09B352803449FF3184780BD8AF107754A36CB01F444401F6895D5E3C7B11814FA54
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 005A961A
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005A965B
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 005A969F
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005A96C9
                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 005A96F2
                                                                                                                                                                                                                                  • GetKeyState.USER32(00000011), ref: 005A978B
                                                                                                                                                                                                                                  • GetKeyState.USER32(00000009), ref: 005A9798
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005A97AE
                                                                                                                                                                                                                                  • GetKeyState.USER32(00000010), ref: 005A97B8
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005A97E9
                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 005A9810
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001030,?,005A7E95), ref: 005A9918
                                                                                                                                                                                                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 005A992E
                                                                                                                                                                                                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 005A9941
                                                                                                                                                                                                                                  • SetCapture.USER32(?), ref: 005A994A
                                                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 005A99AF
                                                                                                                                                                                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 005A99BC
                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005A99D6
                                                                                                                                                                                                                                  • ReleaseCapture.USER32 ref: 005A99E1
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 005A9A19
                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 005A9A26
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 005A9A80
                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 005A9AAE
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 005A9AEB
                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 005A9B1A
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 005A9B3B
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 005A9B4A
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 005A9B68
                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 005A9B75
                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 005A9B93
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 005A9BFA
                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 005A9C2B
                                                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 005A9C84
                                                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 005A9CB4
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 005A9CDE
                                                                                                                                                                                                                                  • SendMessageW.USER32 ref: 005A9D01
                                                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 005A9D4E
                                                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 005A9D82
                                                                                                                                                                                                                                    • Part of subcall function 00529944: GetWindowLongW.USER32(?,000000EB), ref: 00529952
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A9E05
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                                  • String ID: @GUI_DRAGID$F$p#^
                                                                                                                                                                                                                                  • API String ID: 3429851547-1742403966
                                                                                                                                                                                                                                  • Opcode ID: 508a200880fb2dcc4a96c1f3b3d0f8ba6faf4fc5b40d4db587102515b123718b
                                                                                                                                                                                                                                  • Instruction ID: 8b808e43fcf4666124bd06d5fd4d09a42a9fe7d8a9a0dbda268f7e4305b14c51
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 508a200880fb2dcc4a96c1f3b3d0f8ba6faf4fc5b40d4db587102515b123718b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8E427E34604251AFDB25CF28CC84AAEBFE5FF9A310F140A19F6998B2A1D731E854DF51
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 005A48F3
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 005A4908
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 005A4927
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 005A494B
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 005A495C
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 005A497B
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 005A49AE
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 005A49D4
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 005A4A0F
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 005A4A56
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 005A4A7E
                                                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 005A4A97
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005A4AF2
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005A4B20
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A4B94
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 005A4BE3
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 005A4C82
                                                                                                                                                                                                                                  • wsprintfW.USER32 ref: 005A4CAE
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005A4CC9
                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 005A4CF1
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 005A4D13
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005A4D33
                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 005A4D5A
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                                  • String ID: %d/%02d/%02d
                                                                                                                                                                                                                                  • API String ID: 4054740463-328681919
                                                                                                                                                                                                                                  • Opcode ID: ab5bb06dd890db35b6e2fb74b5729845433c4d161124ea0b2c6ad7967ee7c973
                                                                                                                                                                                                                                  • Instruction ID: ff3a53fc80c8389ccc4f5d2e9e7ab0a3bb3ed87342e9b58df4dc6d93e7d984d5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ab5bb06dd890db35b6e2fb74b5729845433c4d161124ea0b2c6ad7967ee7c973
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9312CC71600255ABEB258FA8DC49BAE7FF8BF86310F104529F516EB2E1DBB49940CF50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0052F998
                                                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0056F474
                                                                                                                                                                                                                                  • IsIconic.USER32(00000000), ref: 0056F47D
                                                                                                                                                                                                                                  • ShowWindow.USER32(00000000,00000009), ref: 0056F48A
                                                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0056F494
                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0056F4AA
                                                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0056F4B1
                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0056F4BD
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0056F4CE
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0056F4D6
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0056F4DE
                                                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0056F4E1
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0056F4F6
                                                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0056F501
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0056F50B
                                                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0056F510
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0056F519
                                                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0056F51E
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0056F528
                                                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0056F52D
                                                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0056F530
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0056F557
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                  • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                  • Opcode ID: 99dcc326617ac6edcfe96143e748ccaf05a2417d214f9cd84eeb4c75766db03b
                                                                                                                                                                                                                                  • Instruction ID: 278717d20a80338e72325e7e96d7edf358076d615b21dfaf1c2bde6e3d2b49e1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 99dcc326617ac6edcfe96143e748ccaf05a2417d214f9cd84eeb4c75766db03b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 30311D71E40218BBEB216BB55C4AFBF7E6CEB59B50F100466FA01E71D1CAB15D00ABA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 005716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057170D
                                                                                                                                                                                                                                    • Part of subcall function 005716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0057173A
                                                                                                                                                                                                                                    • Part of subcall function 005716C3: GetLastError.KERNEL32 ref: 0057174A
                                                                                                                                                                                                                                  • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00571286
                                                                                                                                                                                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 005712A8
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 005712B9
                                                                                                                                                                                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 005712D1
                                                                                                                                                                                                                                  • GetProcessWindowStation.USER32 ref: 005712EA
                                                                                                                                                                                                                                  • SetProcessWindowStation.USER32(00000000), ref: 005712F4
                                                                                                                                                                                                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00571310
                                                                                                                                                                                                                                    • Part of subcall function 005710BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005711FC), ref: 005710D4
                                                                                                                                                                                                                                    • Part of subcall function 005710BF: CloseHandle.KERNEL32(?,?,005711FC), ref: 005710E9
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                  • String ID: $default$winsta0$Z]
                                                                                                                                                                                                                                  • API String ID: 22674027-3859823317
                                                                                                                                                                                                                                  • Opcode ID: cd2d9275c718d7bd478246cdea08d36558a52b91fcd7898f05bad04266eb718b
                                                                                                                                                                                                                                  • Instruction ID: fcdd763ae2acfa499678418ae0f127607029247847ce67abfbfdbfc937ca58c6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cd2d9275c718d7bd478246cdea08d36558a52b91fcd7898f05bad04266eb718b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4881AF71900609AFDF219FA8EC49FEE7FBAFF05700F148129F918A61A0D7318944EB64
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00571114
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571120
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 0057112F
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571136
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0057114D
                                                                                                                                                                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00570BCC
                                                                                                                                                                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00570C00
                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00570C17
                                                                                                                                                                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00570C51
                                                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00570C6D
                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00570C84
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00570C8C
                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00570C93
                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00570CB4
                                                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000), ref: 00570CBB
                                                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00570CEA
                                                                                                                                                                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00570D0C
                                                                                                                                                                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00570D1E
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570D45
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00570D4C
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570D55
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00570D5C
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570D65
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00570D6C
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00570D78
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00570D7F
                                                                                                                                                                                                                                    • Part of subcall function 00571193: GetProcessHeap.KERNEL32(00000008,00570BB1,?,00000000,?,00570BB1,?), ref: 005711A1
                                                                                                                                                                                                                                    • Part of subcall function 00571193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00570BB1,?), ref: 005711A8
                                                                                                                                                                                                                                    • Part of subcall function 00571193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00570BB1,?), ref: 005711B7
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4175595110-0
                                                                                                                                                                                                                                  • Opcode ID: 77b9a56704e2ddca1891660ce72c81f3d1bf958924dd6dd603c3fa942a30b92a
                                                                                                                                                                                                                                  • Instruction ID: beedb129fadc94d7be722a950c97dc8b2c039ac6c1c8008448bc0a75d78e36c9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 77b9a56704e2ddca1891660ce72c81f3d1bf958924dd6dd603c3fa942a30b92a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F4713C71A0020AEBDF10DFA5EC48FAEBFB8BF15310F148515E919A7291D771A905EB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • OpenClipboard.USER32(005ACC08), ref: 0058EB29
                                                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 0058EB37
                                                                                                                                                                                                                                  • GetClipboardData.USER32(0000000D), ref: 0058EB43
                                                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 0058EB4F
                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0058EB87
                                                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 0058EB91
                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0058EBBC
                                                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 0058EBC9
                                                                                                                                                                                                                                  • GetClipboardData.USER32(00000001), ref: 0058EBD1
                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0058EBE2
                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0058EC22
                                                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(0000000F), ref: 0058EC38
                                                                                                                                                                                                                                  • GetClipboardData.USER32(0000000F), ref: 0058EC44
                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0058EC55
                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0058EC77
                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0058EC94
                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0058ECD2
                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0058ECF3
                                                                                                                                                                                                                                  • CountClipboardFormats.USER32 ref: 0058ED14
                                                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 0058ED59
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 420908878-0
                                                                                                                                                                                                                                  • Opcode ID: 9f0b9efbb33bc0988138c330b50c787ea237afe7d4e7eb8efb686105dd8d5992
                                                                                                                                                                                                                                  • Instruction ID: 0a8b4eff1b4c06f5b63da2787e81935f4f73e1d3a40baabb761e3da65b3ec795
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9f0b9efbb33bc0988138c330b50c787ea237afe7d4e7eb8efb686105dd8d5992
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5661BF34204202AFD300EF24D89AF6ABFB4BF95714F14451DF896A72A2DB31DD49DB62
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 005869BE
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00586A12
                                                                                                                                                                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00586A4E
                                                                                                                                                                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00586A75
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00586AB2
                                                                                                                                                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00586ADF
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                  • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                  • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                  • Opcode ID: 941213a7484778ab32e6477e783abb961878883097c990a1b8d03eaa8b0e5402
                                                                                                                                                                                                                                  • Instruction ID: 6f7dfe815ac6d371e7caf7b60cfe1a6e556da292a00cf721f621d7a26a54f650
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 941213a7484778ab32e6477e783abb961878883097c990a1b8d03eaa8b0e5402
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: ECD15F72508301AED314EBA4D895EAFBBECBF88704F04491DF985D7291EB34DA44CB62
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00589663
                                                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 005896A1
                                                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 005896BB
                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 005896D3
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 005896DE
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 005896FA
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0058974A
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(005D6B7C), ref: 00589768
                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00589772
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0058977F
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0058978F
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                  • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                  • Opcode ID: 3e2b08dc0ec6f1249e52e93c13f7404d6bfc605f81c451f1b10f59454175141a
                                                                                                                                                                                                                                  • Instruction ID: e06b54ad8eba499b6b8a4fe478946e26cd636b6fb4b98312bde7f07f89520740
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3e2b08dc0ec6f1249e52e93c13f7404d6bfc605f81c451f1b10f59454175141a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C531A03654021A6ADF24AFB5DC49AEE7FACFF4A320F184156F915F21A0EB30DE448B54
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 005897BE
                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00589819
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00589824
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00589840
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00589890
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(005D6B7C), ref: 005898AE
                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 005898B8
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 005898C5
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 005898D5
                                                                                                                                                                                                                                    • Part of subcall function 0057DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0057DB00
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                  • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                  • Opcode ID: af2324613f000af4f34e0b339afbc49c4d921261e59c532d40635e96c8dd665d
                                                                                                                                                                                                                                  • Instruction ID: bd9c7d75efeca15d4609e96e3d13370477dbf0bc7207b4d0043f2a5b7b236691
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: af2324613f000af4f34e0b339afbc49c4d921261e59c532d40635e96c8dd665d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5431B23150021A6AEF20BFA4EC48AEE7FACBF46324F184156E954B2190DB30DE498F60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059B6AE,?,?), ref: 0059C9B5
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059C9F1
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA68
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA9E
                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059BF3E
                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0059BFA9
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0059BFCD
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0059C02C
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0059C0E7
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0059C154
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0059C1E9
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0059C23A
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0059C2E3
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0059C382
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0059C38F
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3102970594-0
                                                                                                                                                                                                                                  • Opcode ID: 12f6cb8e06b946a676f3e2c1aaa92d7764e4db79714c3a30b36b3be1adf104b6
                                                                                                                                                                                                                                  • Instruction ID: 2c5b2b5bcfe71e4df36ba936dd4ff594d412014c7c1d8cc7b451444b97c19a2f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 12f6cb8e06b946a676f3e2c1aaa92d7764e4db79714c3a30b36b3be1adf104b6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EC024C716042019FDB14DF28C895E2ABFE5BF89314F18889DF84ADB2A2D731ED45CB51
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetLocalTime.KERNEL32(?), ref: 00588257
                                                                                                                                                                                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00588267
                                                                                                                                                                                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00588273
                                                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00588310
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00588324
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00588356
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0058838C
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00588395
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                  • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                  • Opcode ID: d6cc8b3e27ef4d0c61ede0a983e01e97532d2a048b51cb7c252edefd544a757f
                                                                                                                                                                                                                                  • Instruction ID: 7c475f708cf66aeafc0f9aa510feada81e8ccd3ae88b66f64402f6417c7d0f99
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d6cc8b3e27ef4d0c61ede0a983e01e97532d2a048b51cb7c252edefd544a757f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 47619E755043069FD710EF64C8459AEBBE9FF89310F448C1EF98993251EB31E945CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00513AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00513A97,?,?,00512E7F,?,?,?,00000000), ref: 00513AC2
                                                                                                                                                                                                                                    • Part of subcall function 0057E199: GetFileAttributesW.KERNEL32(?,0057CF95), ref: 0057E19A
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0057D122
                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0057D1DD
                                                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0057D1F0
                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 0057D20D
                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0057D237
                                                                                                                                                                                                                                    • Part of subcall function 0057D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0057D21C,?,?), ref: 0057D2B2
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000,?,?,?), ref: 0057D253
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0057D264
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                                                  • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                  • Opcode ID: 981ac46e5a791924acc255902c2526183e3029e099f4aaf21512f0d6a05bafef
                                                                                                                                                                                                                                  • Instruction ID: abb67afadee84401edae6accc36a28799cbe7b2ee976bf676f5319ac9f69929a
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 981ac46e5a791924acc255902c2526183e3029e099f4aaf21512f0d6a05bafef
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B1617F3180110EAADF05EBE0D9569EDBFB5BF95300F648065E40677192EB316F49EB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1737998785-0
                                                                                                                                                                                                                                  • Opcode ID: 40d53d5340cc6b32305873e304a09ba6f718dcd2d885cd50c9533605a6c0aa24
                                                                                                                                                                                                                                  • Instruction ID: 2679c957e10afe80cde0d3453917f6397d87073afe060390bf164002e43e7b78
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 40d53d5340cc6b32305873e304a09ba6f718dcd2d885cd50c9533605a6c0aa24
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8941CD35204611AFE320EF19D88AB19BFF5FF55318F14C499E8559B6A2C731EC46CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 005716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057170D
                                                                                                                                                                                                                                    • Part of subcall function 005716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0057173A
                                                                                                                                                                                                                                    • Part of subcall function 005716C3: GetLastError.KERNEL32 ref: 0057174A
                                                                                                                                                                                                                                  • ExitWindowsEx.USER32(?,00000000), ref: 0057E932
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                  • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                  • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                  • Opcode ID: a99771954b857ff24358e4ebec0add295ba28f475951914c1b531091c3dc5599
                                                                                                                                                                                                                                  • Instruction ID: 3d8285020655f0a4da70bace973e2ded67ee0411d300582781ff7b42d04a9a9f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a99771954b857ff24358e4ebec0add295ba28f475951914c1b531091c3dc5599
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 86012B33610311ABEB642678BC8BFBF7E5CB719740F148862FE07E21D1D6605C44A294
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00591276
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00591283
                                                                                                                                                                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 005912BA
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 005912C5
                                                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 005912F4
                                                                                                                                                                                                                                  • listen.WSOCK32(00000000,00000005), ref: 00591303
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 0059130D
                                                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 0059133C
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 540024437-0
                                                                                                                                                                                                                                  • Opcode ID: 93cef969da796da19ceebe48d052bfd0765d33f128b678d9899cb982a21ae9fa
                                                                                                                                                                                                                                  • Instruction ID: 56d52344c05c3da122d081dace615ef2e542fafc9548844fce2655244f72d4ef
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 93cef969da796da19ceebe48d052bfd0765d33f128b678d9899cb982a21ae9fa
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F34190356005129FDB10EF24C488B69BFE6BF86318F188588E8568F2D2C775EC85CBE1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00513AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00513A97,?,?,00512E7F,?,?,?,00000000), ref: 00513AC2
                                                                                                                                                                                                                                    • Part of subcall function 0057E199: GetFileAttributesW.KERNEL32(?,0057CF95), ref: 0057E19A
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0057D420
                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 0057D470
                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0057D481
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0057D498
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0057D4A1
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                                                  • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                  • Opcode ID: f34b22bfdf773d1acf36d8306eb9f5f24247ba4289ec5df2495814359a51ab57
                                                                                                                                                                                                                                  • Instruction ID: 4492faea13b5ff97c31ade59f6912fc78f2ee5c62d5d3948ae735cf9f7e6cddb
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f34b22bfdf773d1acf36d8306eb9f5f24247ba4289ec5df2495814359a51ab57
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2D315E710083429BD701EF64D8599EFBFF8BEE2310F448E1DF4D552191EB60AA49E762
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: __floor_pentium4
                                                                                                                                                                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                                  • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                                  • Opcode ID: 2639705a19b7efbfbdc79290edc89de81fa9247dd7d632e2f70ab8793298c6b6
                                                                                                                                                                                                                                  • Instruction ID: d7c299d255602201832638ca2b45f1e9c501374821133afc9694ce96cd203bf3
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2639705a19b7efbfbdc79290edc89de81fa9247dd7d632e2f70ab8793298c6b6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 58C25A72E046298FDB25CE28DD457EABBB5FB84308F1445EAD44EE7241E774AE818F40
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005864DC
                                                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00586639
                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(005AFCF8,00000000,00000001,005AFB68,?), ref: 00586650
                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 005868D4
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                  • String ID: .lnk
                                                                                                                                                                                                                                  • API String ID: 886957087-24824748
                                                                                                                                                                                                                                  • Opcode ID: bbe80efea17fbf0fbc6bb42756f05901a670b9b3a31076152137757bb55c23c2
                                                                                                                                                                                                                                  • Instruction ID: 5766b7b8f55e185325d770d0756ba79b2c9bba50ec100200c57fc73ef7d1915b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bbe80efea17fbf0fbc6bb42756f05901a670b9b3a31076152137757bb55c23c2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C2D15871508202AFD314EF24C8959ABBBE8FFD8304F40496DF5959B291EB31ED46CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetForegroundWindow.USER32(?,?,00000000), ref: 005922E8
                                                                                                                                                                                                                                    • Part of subcall function 0058E4EC: GetWindowRect.USER32(?,?), ref: 0058E504
                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00592312
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00592319
                                                                                                                                                                                                                                  • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00592355
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00592381
                                                                                                                                                                                                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 005923DF
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2387181109-0
                                                                                                                                                                                                                                  • Opcode ID: 9d1260637b44cc3da4d6eabc3b645c9e0f00466f70fff01a2ab47522f6a789d8
                                                                                                                                                                                                                                  • Instruction ID: ab8ac46f56834affceed31e8a00d84c1667fcb0944549a94fd558a1e514ce4f2
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9d1260637b44cc3da4d6eabc3b645c9e0f00466f70fff01a2ab47522f6a789d8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A231DE72505316AFCB20DF14D849B5BBBE9FF89310F000919F98997191DB34EA08CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00589B78
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00589C8B
                                                                                                                                                                                                                                    • Part of subcall function 00583874: GetInputState.USER32 ref: 005838CB
                                                                                                                                                                                                                                    • Part of subcall function 00583874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00583966
                                                                                                                                                                                                                                  • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00589BA8
                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00589C75
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                  • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                  • Opcode ID: cd9f255d80474b86fe1570301180a13b01a275f20cd8a6e1a37f75b96a972c19
                                                                                                                                                                                                                                  • Instruction ID: 07fbb771b0ffd4c3c3a9af82df8d12deabb020f8fa5dcd6892961e74eb99cc67
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cd9f255d80474b86fe1570301180a13b01a275f20cd8a6e1a37f75b96a972c19
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9341827190420AAFDF15EFA4C899AEEBFB4FF45310F244456E815B2191EB319E84CF60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 00529A4E
                                                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00529B23
                                                                                                                                                                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00529B36
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Color$LongProcWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3131106179-0
                                                                                                                                                                                                                                  • Opcode ID: cfc1820b6075d2964fb69c04e2e07312443c4ce03a80680f2c5169791115175b
                                                                                                                                                                                                                                  • Instruction ID: ac4656bfb01e6cd28b69ffb343ad604e2269c08c0de2d28f6bac8cdb54a34805
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cfc1820b6075d2964fb69c04e2e07312443c4ce03a80680f2c5169791115175b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5AA1F770108668AEE728AA2CAC9CE7F2E9DFF8B354F140609F502D77D1CB259D41D276
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0059304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0059307A
                                                                                                                                                                                                                                    • Part of subcall function 0059304E: _wcslen.LIBCMT ref: 0059309B
                                                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0059185D
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00591884
                                                                                                                                                                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 005918DB
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 005918E6
                                                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00591915
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1601658205-0
                                                                                                                                                                                                                                  • Opcode ID: d168676fb91f24ff3471d8d8bbbccabc734be448441b8c89ff6f3f23ac591d02
                                                                                                                                                                                                                                  • Instruction ID: 05880092055b06d605d49a7d571dcc5d2f2ce00b9ed365500872198dffedfaf6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d168676fb91f24ff3471d8d8bbbccabc734be448441b8c89ff6f3f23ac591d02
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9451B275A002119FEB10AF24C88AF6A7FE5BF85718F048458F9165F3C3D771AD418BA1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 292994002-0
                                                                                                                                                                                                                                  • Opcode ID: b469fcc648145d2b52dc5432de62c34b3b2abcf9c8e2eeb290e155a30e72acab
                                                                                                                                                                                                                                  • Instruction ID: f34e508edbbdb1eaaefda7c8993fd17b0bf63b156bacadfb7320719a1a8a5ba5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b469fcc648145d2b52dc5432de62c34b3b2abcf9c8e2eeb290e155a30e72acab
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1C218331740A115FE7208F2AC854B6E7FE5FF96325F198068E8468B351CB71DC46CB98
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                                  • API String ID: 0-1546025612
                                                                                                                                                                                                                                  • Opcode ID: 3d285605b9d2a835d8779eebecf449feb85882a3e5919315a1bb755c2c2b8fea
                                                                                                                                                                                                                                  • Instruction ID: 8874fc9844aae64ebedaa98193ed84187a1ffb264a53b44f0b5359c1225db84e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3d285605b9d2a835d8779eebecf449feb85882a3e5919315a1bb755c2c2b8fea
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F8A26A74A0061ACBEF348F58C8A47FDBBB1BB54311F6485AAD815A7281EB709D85CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 005782AA
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: lstrlen
                                                                                                                                                                                                                                  • String ID: ($tb]$|
                                                                                                                                                                                                                                  • API String ID: 1659193697-2890004336
                                                                                                                                                                                                                                  • Opcode ID: 46376787a8d577e13fa83f45828fde20f25ac97ab9f081cd557fe36c99ac45da
                                                                                                                                                                                                                                  • Instruction ID: 5acc7c38a10b7b2a8190d46f6875fdd5a946307441f06f886ed1275ad3df5567
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 46376787a8d577e13fa83f45828fde20f25ac97ab9f081cd557fe36c99ac45da
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B2323574A006059FCB28CF59D485A6ABBF0FF48710B15C96EE49ADB7A1EB70E941CB40
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0057AAAC
                                                                                                                                                                                                                                  • SetKeyboardState.USER32(00000080), ref: 0057AAC8
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0057AB36
                                                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0057AB88
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 432972143-0
                                                                                                                                                                                                                                  • Opcode ID: a7b9e625ec7f833e5aca24eb455cca2744b0684910cfdf10f673c823141e59c6
                                                                                                                                                                                                                                  • Instruction ID: 203444b62a6dd7f5777a18ed7777f30a5a573b2bb8ea35d84a609d72279fbf84
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a7b9e625ec7f833e5aca24eb455cca2744b0684910cfdf10f673c823141e59c6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A8311530A40208AEFB25CA64E805BFE7FAABBC5310F04C21AF58D561D0D7748985E7A2
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054BB7F
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                                                                                                                                                                                                  • GetTimeZoneInformation.KERNEL32 ref: 0054BB91
                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,005E121C,000000FF,?,0000003F,?,?), ref: 0054BC09
                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,005E1270,000000FF,?,0000003F,?,?,?,005E121C,000000FF,?,0000003F,?,?), ref: 0054BC36
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 806657224-0
                                                                                                                                                                                                                                  • Opcode ID: 3e0bb39db75abc56f855f9cc5a7e44d331480d5ea5b354ca4a39f09303c81cc2
                                                                                                                                                                                                                                  • Instruction ID: dd9fdd6df58cb5e01f6c69140bd721f6b0eb12806f06c95152f79d0a78499e8c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3e0bb39db75abc56f855f9cc5a7e44d331480d5ea5b354ca4a39f09303c81cc2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9A31EF30904246DFDB08DF6ACCC08ADBFB8FF5631471446AAE190DB2A1C7309E45EB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • InternetReadFile.WININET(?,?,00000400,?), ref: 0058CE89
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 0058CEEA
                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000), ref: 0058CEFE
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 234945975-0
                                                                                                                                                                                                                                  • Opcode ID: 1af3c0899514d57734c9cb63f95676ed35028d830c355d1843ef6a41a15f8789
                                                                                                                                                                                                                                  • Instruction ID: 717ba3dc2f06fa270d90f1c0f6ecd6b7908c38c7464b4538ed53b1bc01d854b1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1af3c0899514d57734c9cb63f95676ed35028d830c355d1843ef6a41a15f8789
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7521B0715003059BE731EF65D949BA67FFCFB51314F10481EEA46E2151E774ED089B60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00585CC1
                                                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00585D17
                                                                                                                                                                                                                                  • FindClose.KERNEL32(?), ref: 00585D5F
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3541575487-0
                                                                                                                                                                                                                                  • Opcode ID: 79b0d09b92e178131098571a6b97c929de154670db76545494c35672081107c8
                                                                                                                                                                                                                                  • Instruction ID: 134cebc8f3110ba2196c20fb66a251dfaa7e2fd0af79521c5f21ed227a080329
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 79b0d09b92e178131098571a6b97c929de154670db76545494c35672081107c8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8351CC346046029FC714DF28C488E9ABBE4FF49314F14855EE99A8B3A2EB30ED44CF91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • IsDebuggerPresent.KERNEL32 ref: 0054271A
                                                                                                                                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00542724
                                                                                                                                                                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00542731
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3906539128-0
                                                                                                                                                                                                                                  • Opcode ID: afa0bad793a59e7ef57cef759c7177a981d01b9904b6c01d6fc933f25c2b7c4e
                                                                                                                                                                                                                                  • Instruction ID: a7e356534833ece82dee2b925e8f95037e498253b70cb1e6148de0dc3a26d460
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: afa0bad793a59e7ef57cef759c7177a981d01b9904b6c01d6fc933f25c2b7c4e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EA31C27490122DABCB21DF68DD887DCBBB8BF18310F5041EAE80CA6260E7309F859F44
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 005851DA
                                                                                                                                                                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00585238
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 005852A1
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1682464887-0
                                                                                                                                                                                                                                  • Opcode ID: 302896f6692914c909f31026dc2ae98f794663d7dc9fff567ab0d280a3bf993f
                                                                                                                                                                                                                                  • Instruction ID: ccff98b3a51e8eda4305d98c6f91e0c6c59991862f3bc10c31d27e16c8ec55a6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 302896f6692914c909f31026dc2ae98f794663d7dc9fff567ab0d280a3bf993f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EC312C75A00619DFDB00EF54D888EADBFB5FF49314F048099E805AB362DB31E85ACB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0052FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00530668
                                                                                                                                                                                                                                    • Part of subcall function 0052FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00530685
                                                                                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057170D
                                                                                                                                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0057173A
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0057174A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 577356006-0
                                                                                                                                                                                                                                  • Opcode ID: 268f155e4c234fe2b6824220a25d3d7e0924c6bc417fc0e4814b7664d9f40f59
                                                                                                                                                                                                                                  • Instruction ID: de28525dfd52e3a4012d6f38bbe328d96869c7069b90e1cfbbb5f54c633fd75f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 268f155e4c234fe2b6824220a25d3d7e0924c6bc417fc0e4814b7664d9f40f59
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5911CEB2400305AFD718AF58EC8AD6ABBBDFF45714B20C52EE05A57281EB70BC419B24
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0057D608
                                                                                                                                                                                                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0057D645
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0057D650
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 33631002-0
                                                                                                                                                                                                                                  • Opcode ID: c8c7cfe43975fe371337c872d3ecfa002b006c502362fbed1bf106f54566f85b
                                                                                                                                                                                                                                  • Instruction ID: 97260a61659f020e052c7f1a407080e120ad8ae6da29ee8d527df9d05606bc67
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c8c7cfe43975fe371337c872d3ecfa002b006c502362fbed1bf106f54566f85b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C2115E75E05228BFDB108F95EC45FAFBFBCEB45B50F108156F908E7290D6704A059BA1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0057168C
                                                                                                                                                                                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 005716A1
                                                                                                                                                                                                                                  • FreeSid.ADVAPI32(?), ref: 005716B1
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3429775523-0
                                                                                                                                                                                                                                  • Opcode ID: 94809f7e001e4ed01662eaaf9c3d4e79071f6493883b96a9ddbf9ebd256bffaa
                                                                                                                                                                                                                                  • Instruction ID: 176b2a6727dfe6d7a91da12daf738ecc5d2fe21a0fde1488a30f27f53cf86fe0
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 94809f7e001e4ed01662eaaf9c3d4e79071f6493883b96a9ddbf9ebd256bffaa
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 89F0F47195030DFBDB00DFE49D89AAEBBBCFB08604F508565E501E2181E774AA489A54
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetUserNameW.ADVAPI32(?,?), ref: 0056D28C
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: NameUser
                                                                                                                                                                                                                                  • String ID: X64
                                                                                                                                                                                                                                  • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                  • Opcode ID: 2f228e23243c86e7b0a3d14bb8becef993a5380fd53c8a845864ef320cfb6577
                                                                                                                                                                                                                                  • Instruction ID: 34cacf5799088c056a9b5001acc38c10fcd8f24555b7ad87b395c2364a787781
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2f228e23243c86e7b0a3d14bb8becef993a5380fd53c8a845864ef320cfb6577
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 84D0CAB880116DEACB94CBA0EC8CDDEBBBCBB15305F100A92F506A2040EB3496489F20
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                  • Instruction ID: fcaf572f7ff181801ed2caa820e665f338e686476372e5d8e27cefae35fad23e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E8020B72E002199BDF14CFA9C8906ADBFF5FF88314F25816AD819FB285D731AD418B94
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: Variable is not of type 'Object'.$p#^
                                                                                                                                                                                                                                  • API String ID: 0-3707816926
                                                                                                                                                                                                                                  • Opcode ID: 5c2919906132e98298bd135c688006b3cb8e7eb8045be21aa25c449b8d9b0fe3
                                                                                                                                                                                                                                  • Instruction ID: 2807d7fc1836201bd9873582010fc7f00350088419aac3f565dcc528cbf25a3d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5c2919906132e98298bd135c688006b3cb8e7eb8045be21aa25c449b8d9b0fe3
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1C32C030940219DFEF14DF90D885AEEBFB9FF45304F108459E806AB292D736AD86CB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00586918
                                                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00586961
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2295610775-0
                                                                                                                                                                                                                                  • Opcode ID: e6c2e0ca8263addc36a6ca751e9337bcb197e074e1814221ff7d3751d7a85301
                                                                                                                                                                                                                                  • Instruction ID: 92dfe15808c49cd0ccfba3780411d71d20029e8ed3f7a5579bcaf8d9de36e887
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e6c2e0ca8263addc36a6ca751e9337bcb197e074e1814221ff7d3751d7a85301
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D71190356042019FD710DF29D489A16BFE5FF89328F14C699E8699F7A2CB30EC45CB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00594891,?,?,00000035,?), ref: 005837E4
                                                                                                                                                                                                                                  • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00594891,?,?,00000035,?), ref: 005837F4
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3479602957-0
                                                                                                                                                                                                                                  • Opcode ID: 5d17485d37c43069677baa574a1c4a16a3a15347ea22a6834d119a8776dc343d
                                                                                                                                                                                                                                  • Instruction ID: a6f8d38a89109b4b3722f9ac3bc4949022bce98d14447c11d8e8f71cdf397620
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5d17485d37c43069677baa574a1c4a16a3a15347ea22a6834d119a8776dc343d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7DF0EC706042152AE71067654C4DFDB3F9DFFC5B61F000175F905E2281D9609D48C7B0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0057B25D
                                                                                                                                                                                                                                  • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 0057B270
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3536248340-0
                                                                                                                                                                                                                                  • Opcode ID: d6c9a3098517764197ed367059a9a3fc2298711e6847290b8a8b1457c0d377f6
                                                                                                                                                                                                                                  • Instruction ID: fa89f0b1796bb0ab1996e96e381df4b7cf9068d0bd5d1a0053f1d3c435a53079
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d6c9a3098517764197ed367059a9a3fc2298711e6847290b8a8b1457c0d377f6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8CF01D7580424DABEB059FA0D805BBE7FB4FF09309F008409F955A5192C3798615AF94
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005711FC), ref: 005710D4
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,005711FC), ref: 005710E9
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 81990902-0
                                                                                                                                                                                                                                  • Opcode ID: adf179083da7eeff2f1bf6227ec6ab508c122a2012d43d70ab697419a8251e67
                                                                                                                                                                                                                                  • Instruction ID: a9e1315f29f48ef04729aaa2af4eb85710bee989828662f9d1c3b48f999a4b77
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: adf179083da7eeff2f1bf6227ec6ab508c122a2012d43d70ab697419a8251e67
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 52E04F32004611AFE7252B11FC09E777FA9FF05310B10882EF4A6804B1DB626C90EB14
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00546766,?,?,00000008,?,?,0054FEFE,00000000), ref: 00546998
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ExceptionRaise
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3997070919-0
                                                                                                                                                                                                                                  • Opcode ID: 3357750c0ab2e6af0b31174f06c12230542f54d63663b26414352bf51180f7f7
                                                                                                                                                                                                                                  • Instruction ID: e93db8e4fcc023ba353d75c78951ea72e99b9ec9bab419e8e81d22aa8d84caec
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3357750c0ab2e6af0b31174f06c12230542f54d63663b26414352bf51180f7f7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 22B15B31610609DFD719CF28C48ABA57FE0FF46368F258658E899CF2A2C335E991CB41
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 0-3916222277
                                                                                                                                                                                                                                  • Opcode ID: c29aeaa10a3b8757eb0b3a25c3dba397e8bdc29f2395b5372918fb1970a2307d
                                                                                                                                                                                                                                  • Instruction ID: 5c5ea13b49c66f16d1b63a57e8fba0a420e47a1751b90403a6d7de34746e4853
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c29aeaa10a3b8757eb0b3a25c3dba397e8bdc29f2395b5372918fb1970a2307d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 06126F75A002299BDF14DF58D8806FEBBF5FF59310F14859AE849EB291DB309E81CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • BlockInput.USER32(00000001), ref: 0058EABD
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: BlockInput
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3456056419-0
                                                                                                                                                                                                                                  • Opcode ID: 29d3f5c5edae03487e1152dba985bcaef45ea37853529fdc6d3b2e9f4fc4aa5f
                                                                                                                                                                                                                                  • Instruction ID: e0f9a164f958f0ca17671cc39ec2c663608b09c8ba1b3d21dd89983a255078c8
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 29d3f5c5edae03487e1152dba985bcaef45ea37853529fdc6d3b2e9f4fc4aa5f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EAE01A312002059FE710EF59D809E9ABFE9BF99760F008416FC49D7351DA70E8818B90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,005303EE), ref: 005309DA
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3192549508-0
                                                                                                                                                                                                                                  • Opcode ID: b3f36f544b99d9c6b1559afa8afdcb790843ca92c1cb2ad20033261c2e6b4bd1
                                                                                                                                                                                                                                  • Instruction ID: 6731236b3270fc932bb6af9d12ce81b37ddfd2a7c636efd81943a63c572f10a7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b3f36f544b99d9c6b1559afa8afdcb790843ca92c1cb2ad20033261c2e6b4bd1
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                  • API String ID: 0-4108050209
                                                                                                                                                                                                                                  • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                  • Instruction ID: c72c856620d185eec990f30792e31fc344d2dd9885a31418fd5a459ee12330fe
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EF516CF2E0C74E6BDB384568485E7BEAFC5BB5E340F180A49E982D7382C615DE01D355
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: 0&^
                                                                                                                                                                                                                                  • API String ID: 0-2485633877
                                                                                                                                                                                                                                  • Opcode ID: 5af71e68612727b4e5fa3f6dbadaf52ecfd76c5220cf684b171f7574932750c1
                                                                                                                                                                                                                                  • Instruction ID: efdc774adaccca72eb9060afdade9a38d72b28871f9316ceea658329a6bf2281
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5af71e68612727b4e5fa3f6dbadaf52ecfd76c5220cf684b171f7574932750c1
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DE21D5326206518BDB2CCE79C82767A77E9B7A4310F14862EE4A7D73D0DE75A904DB80
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 00957ae74aa333ff8c3dc43abd3739c771e98fcd8703cc6cbd7d3cb4f14d8e05
                                                                                                                                                                                                                                  • Instruction ID: 538f5619cd2a7d3531932885f1cc1bcf4285ae1ba0609ecf9c2ad259a2c2a61d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 00957ae74aa333ff8c3dc43abd3739c771e98fcd8703cc6cbd7d3cb4f14d8e05
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 28324431D28F054EDB639634C8223756A8DAFBB3C9F15C737E81AB59A6EB28D4835100
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: c26b292e18e9a31aba765d270f4dac030bdf9532f4e90805d650d0f913a44ca5
                                                                                                                                                                                                                                  • Instruction ID: b4b2b6670b6a46d1a79ee37a0e1aa948a2e83be6d24b152ad9c1740506fc0e11
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c26b292e18e9a31aba765d270f4dac030bdf9532f4e90805d650d0f913a44ca5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1132F232A001658BDF28CE69D89467D7FA1FF46300F28856BD4EADB792D630DE81DB41
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 3df1b824fb751c9db15ead2e2fd79593689761ceeae5943f05296bfb10717a87
                                                                                                                                                                                                                                  • Instruction ID: 96dd3358aa9fc646125892e4841828c2d94547bf540d9603fff657cf00a5c39a
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3df1b824fb751c9db15ead2e2fd79593689761ceeae5943f05296bfb10717a87
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5A22B270A0460ADFEF14CF68D865AEEBBB5FF48301F10452AE816A7291FB35AD54CB50
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 7eefd29311bdfc5e2b1a939e7aa14834f950f7d5fe8fc793def21c9357b82f89
                                                                                                                                                                                                                                  • Instruction ID: 569ac9444a55ac1755b9f3dd5d1498b080e8181ff17d1e372d27061967790070
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7eefd29311bdfc5e2b1a939e7aa14834f950f7d5fe8fc793def21c9357b82f89
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5E02E8B1E00206EBDB05DF64D896AADBFB5FF44300F11856AE816DB291E731EE54CB81
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: c6d3c448c2e139b22669b5166a571d3b3392011c7eb69f44aa409d58a05b9351
                                                                                                                                                                                                                                  • Instruction ID: 43689ecb61664e5e97fa1c94646beb450a6b8f5327d9f42c02463b4ded8d3e6b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c6d3c448c2e139b22669b5166a571d3b3392011c7eb69f44aa409d58a05b9351
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 39B1F120D2AF404DD36396398831337BA8CAFBB2C5F91DB1BFC1674D22EB2295879140
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                  • Instruction ID: 776d4bfb39ffbb146dbfbe42a2817ca310806dc6a39976d7a32dd73c1ccdbdd8
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C99178732084A34ADB69463E857407EFFE17A923A1B1A0B9DD4F2CB1C5FE24C954E724
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                  • Instruction ID: 21dd7a12f8bab4f36f37a557ca2ede4b7b7922c3b09308ea03b2df29e2c0caf0
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9B916A732098A349D76D423D857803DFFE16A923A1F1A079DD4F2CB1C5EE24D568D624
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                  • Instruction ID: 7b77afa1755ae17b678c8bd0505fc09574663a2bd1a061a7bc7b46bc2d8ed6bc
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AF9145732098E34EDB2D467A857403EFFE16A923A2B1A079DD4F2CB1C1FE14C964D624
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 3209de6a0479d8c7121cce61d4ff15b729cf2cde7c9c6418e444edb62aa39ce3
                                                                                                                                                                                                                                  • Instruction ID: 50b5a69be44266dd7199e9a4bae3124cc82c5a7c218cc410244de98d72f1e9bc
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3209de6a0479d8c7121cce61d4ff15b729cf2cde7c9c6418e444edb62aa39ce3
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2F612AF1E0874E66DA785A2849B5BBEAFA4FF8D700F140D19F843DB281E6119E41C355
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 1d23281aacfac0db8e7e6f601fe87771f226220c8713d3e1c89d8b957484ce0d
                                                                                                                                                                                                                                  • Instruction ID: 7d8ec3ef7723152945fb120f14bb6e29f03ec609e5954a80949da84eca23569d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1d23281aacfac0db8e7e6f601fe87771f226220c8713d3e1c89d8b957484ce0d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0A6159F1E0870E66DE389A388895BBE2F98FF8E700F540D59F943DB281DA129D42D255
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                  • Instruction ID: 9127fcd35deeb4ff7a40335f90b528e0281608f6d0aa8d038872b92310812c53
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E98188336094A34DDB6D863A853453EFFE17A923A1B1E079DD4F2CB1C1EE24C554D628
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00592B30
                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00592B43
                                                                                                                                                                                                                                  • DestroyWindow.USER32 ref: 00592B52
                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00592B6D
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00592B74
                                                                                                                                                                                                                                  • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00592CA3
                                                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00592CB1
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592CF8
                                                                                                                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00592D04
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00592D40
                                                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592D62
                                                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592D75
                                                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592D80
                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00592D89
                                                                                                                                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592D98
                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00592DA1
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592DA8
                                                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00592DB3
                                                                                                                                                                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592DC5
                                                                                                                                                                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,005AFC38,00000000), ref: 00592DDB
                                                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00592DEB
                                                                                                                                                                                                                                  • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00592E11
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00592E30
                                                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592E52
                                                                                                                                                                                                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0059303F
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                  • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                  • Opcode ID: a0d8ee3343bf5e662cf8efd1b1dad136db9ec5ae20eea3d995f91820ea175789
                                                                                                                                                                                                                                  • Instruction ID: a658e8566bcbc5b811fbe4d2704be4992c5475ad60fac345de20c93da84dea2f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a0d8ee3343bf5e662cf8efd1b1dad136db9ec5ae20eea3d995f91820ea175789
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 75027A71A00209AFDB14DF68CC89EAE7FB9FF49310F008558F915AB2A1DB74AD45DB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 005A712F
                                                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 005A7160
                                                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 005A716C
                                                                                                                                                                                                                                  • SetBkColor.GDI32(?,000000FF), ref: 005A7186
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 005A7195
                                                                                                                                                                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 005A71C0
                                                                                                                                                                                                                                  • GetSysColor.USER32(00000010), ref: 005A71C8
                                                                                                                                                                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 005A71CF
                                                                                                                                                                                                                                  • FrameRect.USER32(?,?,00000000), ref: 005A71DE
                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 005A71E5
                                                                                                                                                                                                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 005A7230
                                                                                                                                                                                                                                  • FillRect.USER32(?,?,?), ref: 005A7262
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A7284
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: GetSysColor.USER32(00000012), ref: 005A7421
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: SetTextColor.GDI32(?,?), ref: 005A7425
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: GetSysColorBrush.USER32(0000000F), ref: 005A743B
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: GetSysColor.USER32(0000000F), ref: 005A7446
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: GetSysColor.USER32(00000011), ref: 005A7463
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 005A7471
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: SelectObject.GDI32(?,00000000), ref: 005A7482
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: SetBkColor.GDI32(?,00000000), ref: 005A748B
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: SelectObject.GDI32(?,?), ref: 005A7498
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 005A74B7
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005A74CE
                                                                                                                                                                                                                                    • Part of subcall function 005A73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 005A74DB
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4124339563-0
                                                                                                                                                                                                                                  • Opcode ID: e495c7623fa1525b9899bbbd19335958371dffef6ca14c58a27d130bded609a7
                                                                                                                                                                                                                                  • Instruction ID: 9e0bcbd9bb9c35c7f9045a8e5b9d3a3e4844c77660121f3b47190b4ba9668048
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e495c7623fa1525b9899bbbd19335958371dffef6ca14c58a27d130bded609a7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 96A19C72508305AFDB009F60DC48A6FBFE9FF9E320F100A19FA62961A1D730E948DB51
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • DestroyWindow.USER32(?,?), ref: 00528E14
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00566AC5
                                                                                                                                                                                                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00566AFE
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00566F43
                                                                                                                                                                                                                                    • Part of subcall function 00528F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00528BE8,?,00000000,?,?,?,?,00528BBA,00000000,?), ref: 00528FC5
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001053), ref: 00566F7F
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00566F96
                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00566FAC
                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00566FB7
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                  • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                  • Opcode ID: c86afaa39f83b6e2f73581394125333b95f84c4efadbc434a888d0b833933765
                                                                                                                                                                                                                                  • Instruction ID: f4de8b26466931e39962bd73c3442262321286c3043d3a9156dd4324a2c4ea55
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c86afaa39f83b6e2f73581394125333b95f84c4efadbc434a888d0b833933765
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0C129B30601651EFDB25CF14D888BBABFE9FF5A300F144569E485CB2A2CB32AC55DB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • DestroyWindow.USER32(00000000), ref: 0059273E
                                                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0059286A
                                                                                                                                                                                                                                  • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 005928A9
                                                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 005928B9
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00592900
                                                                                                                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 0059290C
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00592955
                                                                                                                                                                                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00592964
                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00592974
                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00592978
                                                                                                                                                                                                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00592988
                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00592991
                                                                                                                                                                                                                                  • DeleteDC.GDI32(00000000), ref: 0059299A
                                                                                                                                                                                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 005929C6
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 005929DD
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00592A1D
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00592A31
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00592A42
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00592A77
                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00592A82
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00592A8D
                                                                                                                                                                                                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00592A97
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                  • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                  • Opcode ID: 2bd84887d2d0ebc291479d75db7d456c73165498930e3a0e3cd3a44019db8e54
                                                                                                                                                                                                                                  • Instruction ID: ea1cfc400f18c441bae5644aa6780bcb876581a182681f117f3de12bcfcece12
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2bd84887d2d0ebc291479d75db7d456c73165498930e3a0e3cd3a44019db8e54
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 30B14A71A00219BFEB14DFA8CC89EAE7BA9FB59710F008515F915EB290D770AD44CBA4
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00584AED
                                                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?,005ACB68,?,\\.\,005ACC08), ref: 00584BCA
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,005ACB68,?,\\.\,005ACC08), ref: 00584D36
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                  • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                  • Opcode ID: 0f675184068f30a067ee6eb4d245cfc2c0f77a0779eb0a8264397a33c53efaf3
                                                                                                                                                                                                                                  • Instruction ID: a4fe4a10574a2f80bbe6cb3e0c7aae25122c1ee87098477094d33ddda477cca2
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0f675184068f30a067ee6eb4d245cfc2c0f77a0779eb0a8264397a33c53efaf3
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9F619F306052079BCB24FF28DA859A8BFB5BB44300B248817EC06BB391DB71ED42DF51
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetSysColor.USER32(00000012), ref: 005A7421
                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 005A7425
                                                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 005A743B
                                                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 005A7446
                                                                                                                                                                                                                                  • CreateSolidBrush.GDI32(?), ref: 005A744B
                                                                                                                                                                                                                                  • GetSysColor.USER32(00000011), ref: 005A7463
                                                                                                                                                                                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 005A7471
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 005A7482
                                                                                                                                                                                                                                  • SetBkColor.GDI32(?,00000000), ref: 005A748B
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 005A7498
                                                                                                                                                                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 005A74B7
                                                                                                                                                                                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005A74CE
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 005A74DB
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005A752A
                                                                                                                                                                                                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 005A7554
                                                                                                                                                                                                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 005A7572
                                                                                                                                                                                                                                  • DrawFocusRect.USER32(?,?), ref: 005A757D
                                                                                                                                                                                                                                  • GetSysColor.USER32(00000011), ref: 005A758E
                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 005A7596
                                                                                                                                                                                                                                  • DrawTextW.USER32(?,005A70F5,000000FF,?,00000000), ref: 005A75A8
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 005A75BF
                                                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 005A75CA
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 005A75D0
                                                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 005A75D5
                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 005A75DB
                                                                                                                                                                                                                                  • SetBkColor.GDI32(?,?), ref: 005A75E5
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1996641542-0
                                                                                                                                                                                                                                  • Opcode ID: 9b5707a3c4ff48b5c4cf9c4dba9b8b1f77cc3c1142d4a5c4a50eb0c17a25add5
                                                                                                                                                                                                                                  • Instruction ID: fd6aa1b34001fde29dca1707c8de140ed363b044908c8989d770abc0267c3d0f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9b5707a3c4ff48b5c4cf9c4dba9b8b1f77cc3c1142d4a5c4a50eb0c17a25add5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 19614A72D04218AFDF019FA4DC49AAEBFB9FF0E320F114525F915AB2A1D7749940DB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 005A1128
                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 005A113D
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 005A1144
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A1199
                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 005A11B9
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 005A11ED
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005A120B
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 005A121D
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000421,?,?), ref: 005A1232
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 005A1245
                                                                                                                                                                                                                                  • IsWindowVisible.USER32(00000000), ref: 005A12A1
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 005A12BC
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 005A12D0
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005A12E8
                                                                                                                                                                                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 005A130E
                                                                                                                                                                                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 005A1328
                                                                                                                                                                                                                                  • CopyRect.USER32(?,?), ref: 005A133F
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000412,00000000), ref: 005A13AA
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                  • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                  • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                  • Opcode ID: 47b56bf184305f637032142a3dcff30c7487bbed3e454ac0d3ea40623ecda33c
                                                                                                                                                                                                                                  • Instruction ID: 198b70755214fe71dde5ade3987a4bcd251b9b3215ad0fd46f9e56ff55373691
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 47b56bf184305f637032142a3dcff30c7487bbed3e454ac0d3ea40623ecda33c
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D9B18E71608741AFE704DF64C888BAEBFE5FF89350F008919F9999B261D731E844CB95
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00528968
                                                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00528970
                                                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0052899B
                                                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000008), ref: 005289A3
                                                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000004), ref: 005289C8
                                                                                                                                                                                                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005289E5
                                                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005289F5
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00528A28
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00528A3C
                                                                                                                                                                                                                                  • GetClientRect.USER32(00000000,000000FF), ref: 00528A5A
                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00528A76
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00528A81
                                                                                                                                                                                                                                    • Part of subcall function 0052912D: GetCursorPos.USER32(?), ref: 00529141
                                                                                                                                                                                                                                    • Part of subcall function 0052912D: ScreenToClient.USER32(00000000,?), ref: 0052915E
                                                                                                                                                                                                                                    • Part of subcall function 0052912D: GetAsyncKeyState.USER32(00000001), ref: 00529183
                                                                                                                                                                                                                                    • Part of subcall function 0052912D: GetAsyncKeyState.USER32(00000002), ref: 0052919D
                                                                                                                                                                                                                                  • SetTimer.USER32(00000000,00000000,00000028,005290FC), ref: 00528AA8
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                  • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                  • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                  • Opcode ID: d5d970c422ca8c4c55f010799f74d9583bce0dcc5143c72287e03b715905b41b
                                                                                                                                                                                                                                  • Instruction ID: a49518bc8308b6110373f55120e4a08c53023691890e86ad0f41bf4d57921c7d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d5d970c422ca8c4c55f010799f74d9583bce0dcc5143c72287e03b715905b41b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AAB17971A0021A9FDB14DFA8DD89BAE7FB5FB49314F104229FA15EB2D0DB30A840DB55
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00571114
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571120
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 0057112F
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571136
                                                                                                                                                                                                                                    • Part of subcall function 005710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0057114D
                                                                                                                                                                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00570DF5
                                                                                                                                                                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00570E29
                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00570E40
                                                                                                                                                                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00570E7A
                                                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00570E96
                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00570EAD
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00570EB5
                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00570EBC
                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00570EDD
                                                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000), ref: 00570EE4
                                                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00570F13
                                                                                                                                                                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00570F35
                                                                                                                                                                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00570F47
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570F6E
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00570F75
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570F7E
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00570F85
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570F8E
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00570F95
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00570FA1
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00570FA8
                                                                                                                                                                                                                                    • Part of subcall function 00571193: GetProcessHeap.KERNEL32(00000008,00570BB1,?,00000000,?,00570BB1,?), ref: 005711A1
                                                                                                                                                                                                                                    • Part of subcall function 00571193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00570BB1,?), ref: 005711A8
                                                                                                                                                                                                                                    • Part of subcall function 00571193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00570BB1,?), ref: 005711B7
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4175595110-0
                                                                                                                                                                                                                                  • Opcode ID: bea69d52af77047b49f5a6392c53582e99e784c421afece7c01ef645d96fe983
                                                                                                                                                                                                                                  • Instruction ID: 94147933d3616d56b47a737123f6dcf21e42dfbca505811c516e75b67ece4b5c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bea69d52af77047b49f5a6392c53582e99e784c421afece7c01ef645d96fe983
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 20714B72A0020AEBDF20DFA5EC48BAEBFB8BF15310F148115F919A6191D7719A09DB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059C4BD
                                                                                                                                                                                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,005ACC08,00000000,?,00000000,?,?), ref: 0059C544
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0059C5A4
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0059C5F4
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0059C66F
                                                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0059C6B2
                                                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0059C7C1
                                                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0059C84D
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0059C881
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0059C88E
                                                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0059C960
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                  • API String ID: 9721498-966354055
                                                                                                                                                                                                                                  • Opcode ID: ecd562a3499526a69a0238dd3215be9ca8ecb7fcacc5067f09f87d8eadb11a20
                                                                                                                                                                                                                                  • Instruction ID: 65d6091ea8e7ebefa0a227b30dc96ce80afb7bf4a83d511ccdbefd82c9d558a1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ecd562a3499526a69a0238dd3215be9ca8ecb7fcacc5067f09f87d8eadb11a20
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 891248356042029FDB14DF18C895A6ABFE5FF88714F05885DF85A9B3A2DB31ED81CB81
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?), ref: 005A09C6
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A0A01
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005A0A54
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A0A8A
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A0B06
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A0B81
                                                                                                                                                                                                                                    • Part of subcall function 0052F9F2: _wcslen.LIBCMT ref: 0052F9FD
                                                                                                                                                                                                                                    • Part of subcall function 00572BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00572BFA
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                  • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                  • Opcode ID: 183a11114ebdba956d1e227a35ebcf89a2938ea692ca679c3ecc26221646e1a4
                                                                                                                                                                                                                                  • Instruction ID: 0b84ee3c1e562423bf36c7d2a3e3ff1fe8f90e3f4bb890a435a2b89ac42ce134
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 183a11114ebdba956d1e227a35ebcf89a2938ea692ca679c3ecc26221646e1a4
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0EE17A312183069FC714DF28C45096EBBE2BF9A314F14895DF8969B3A2D731ED85CB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                  • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                  • Opcode ID: 127438a9f410792700a45c4835133499e74ab092614900d6fa17821f88732fa9
                                                                                                                                                                                                                                  • Instruction ID: eaf357bb85fa78da58079f1accf41328e4737ca79a2a4b9a844b8bb73652b882
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 127438a9f410792700a45c4835133499e74ab092614900d6fa17821f88732fa9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5D71E23260016B8BCF20DE7CC9515BE3FA2BFA5764F650529F8669B284E635CD84C7A0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A835A
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A836E
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A8391
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A83B4
                                                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 005A83F2
                                                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,005A361A,?), ref: 005A844E
                                                                                                                                                                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 005A8487
                                                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 005A84CA
                                                                                                                                                                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 005A8501
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?), ref: 005A850D
                                                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 005A851D
                                                                                                                                                                                                                                  • DestroyIcon.USER32(?), ref: 005A852C
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 005A8549
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 005A8555
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                  • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                  • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                  • Opcode ID: 8dcef1b7d0d98209c2095154804ca46b79036a4fbb0d84f637fee62daa3745be
                                                                                                                                                                                                                                  • Instruction ID: 4000e39377e1ed38495077e0679b0884a2ba5d4673d1438b79dc369000e5dc70
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8dcef1b7d0d98209c2095154804ca46b79036a4fbb0d84f637fee62daa3745be
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9F61E07190020ABFEB14DF64CC45BBE7FA8FB49721F10450AF815DA1D1EB74A980DBA0
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                                  • API String ID: 0-1645009161
                                                                                                                                                                                                                                  • Opcode ID: 23e1185765fcdb0110c6cddf5a56448abe5d3fa94c39c3b78a9f952bdc06ed47
                                                                                                                                                                                                                                  • Instruction ID: 8b0ea2b4074395fc69489bc7cb3bfefd18196bf34bccab275f2d21d2cdcfb67c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 23e1185765fcdb0110c6cddf5a56448abe5d3fa94c39c3b78a9f952bdc06ed47
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5B81E67160460ABBEB20AF64DC56FEE3F78FF59300F044025F905AA192EB70D985D7A1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CharLowerBuffW.USER32(?,?), ref: 00583EF8
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00583F03
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00583F5A
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00583F98
                                                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?), ref: 00583FD6
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0058401E
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00584059
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00584087
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                  • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                  • Opcode ID: b85a5ea33abb4c7150b880d2cbb4294d5dc32ddfa338ffaf67ef83e1cd37357b
                                                                                                                                                                                                                                  • Instruction ID: 215ecb3d53d929f388a7880e06f5c80c20b296177a816379dafcab293c2bd361
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b85a5ea33abb4c7150b880d2cbb4294d5dc32ddfa338ffaf67ef83e1cd37357b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A97190316042029FD310EF24C8859AABFE4FF94754F10492EF995A7261EB35ED46CB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadIconW.USER32(00000063), ref: 00575A2E
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00575A40
                                                                                                                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00575A57
                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00575A6C
                                                                                                                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00575A72
                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00575A82
                                                                                                                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00575A88
                                                                                                                                                                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00575AA9
                                                                                                                                                                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00575AC3
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00575ACC
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00575B33
                                                                                                                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00575B6F
                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00575B75
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00575B7C
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00575BD3
                                                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00575BE0
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000005,00000000,?), ref: 00575C05
                                                                                                                                                                                                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00575C2F
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 895679908-0
                                                                                                                                                                                                                                  • Opcode ID: 30612cc84018b78f48cf7f01230e89490f7eba844d435360fa553fc67054d6f2
                                                                                                                                                                                                                                  • Instruction ID: f717d6a50677cd11ac83ddbc175e8d267dfc15700b27c56e0b97a4f71b2ac2ed
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 30612cc84018b78f48cf7f01230e89490f7eba844d435360fa553fc67054d6f2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B0717F31900B059FDB20DFA8DE85A6EBFF5FF48705F104918E18AA35A0E7B4E944DB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 0058FE27
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 0058FE32
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 0058FE3D
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 0058FE48
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 0058FE53
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 0058FE5E
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 0058FE69
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 0058FE74
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 0058FE7F
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 0058FE8A
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 0058FE95
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 0058FEA0
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 0058FEAB
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 0058FEB6
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 0058FEC1
                                                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 0058FECC
                                                                                                                                                                                                                                  • GetCursorInfo.USER32(?), ref: 0058FEDC
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0058FF1E
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3215588206-0
                                                                                                                                                                                                                                  • Opcode ID: bf5abb4dc0c1c5e019b0050a9ba05f14132099d8eb08f8e80cf2cdbd0d21cbc3
                                                                                                                                                                                                                                  • Instruction ID: d66161c3e5ed8d12d18b654362200d09650603ace43a04255dd92a3fcf9e320b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bf5abb4dc0c1c5e019b0050a9ba05f14132099d8eb08f8e80cf2cdbd0d21cbc3
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 274151B0D443196ADB109FBA8C8985EBFE8FF08354B50452AE519E7281DB78A9018F91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[]
                                                                                                                                                                                                                                  • API String ID: 176396367-4125391415
                                                                                                                                                                                                                                  • Opcode ID: c85ac22828e6aa4ecbafa830eb0d43ad4ccbc1c81dd54fbe0dc067889a816da8
                                                                                                                                                                                                                                  • Instruction ID: 4fce7546877220f89ca9fbb137fdb8872f5243ea5fc453e8c3f1c017bfd1431e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c85ac22828e6aa4ecbafa830eb0d43ad4ccbc1c81dd54fbe0dc067889a816da8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FCE1E732A00516ABCF28DF78D4556EDBFB1BF44720F54C52AE45AA7240EB30AE85F790
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 005300C6
                                                                                                                                                                                                                                    • Part of subcall function 005300ED: InitializeCriticalSectionAndSpinCount.KERNEL32(005E070C,00000FA0,67C35D53,?,?,?,?,005523B3,000000FF), ref: 0053011C
                                                                                                                                                                                                                                    • Part of subcall function 005300ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,005523B3,000000FF), ref: 00530127
                                                                                                                                                                                                                                    • Part of subcall function 005300ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,005523B3,000000FF), ref: 00530138
                                                                                                                                                                                                                                    • Part of subcall function 005300ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0053014E
                                                                                                                                                                                                                                    • Part of subcall function 005300ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0053015C
                                                                                                                                                                                                                                    • Part of subcall function 005300ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0053016A
                                                                                                                                                                                                                                    • Part of subcall function 005300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00530195
                                                                                                                                                                                                                                    • Part of subcall function 005300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005301A0
                                                                                                                                                                                                                                  • ___scrt_fastfail.LIBCMT ref: 005300E7
                                                                                                                                                                                                                                    • Part of subcall function 005300A3: __onexit.LIBCMT ref: 005300A9
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  • InitializeConditionVariable, xrefs: 00530148
                                                                                                                                                                                                                                  • kernel32.dll, xrefs: 00530133
                                                                                                                                                                                                                                  • WakeAllConditionVariable, xrefs: 00530162
                                                                                                                                                                                                                                  • SleepConditionVariableCS, xrefs: 00530154
                                                                                                                                                                                                                                  • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00530122
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                  • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                  • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                  • Opcode ID: 7b9d8a64aef4c36090ce989931249560b62d120c9820ec9e071151759eed3783
                                                                                                                                                                                                                                  • Instruction ID: 2b027beda6b6cd48bbc23366fbf28800fc68745221f96054de72aafd0fca023f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b9d8a64aef4c36090ce989931249560b62d120c9820ec9e071151759eed3783
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 63212632A407116BE7256BA4BC59B2E7FE8FB56B61F00113AF801E72D1DBB09C04DB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CharLowerBuffW.USER32(00000000,00000000,005ACC08), ref: 00584527
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0058453B
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00584599
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005845F4
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0058463F
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005846A7
                                                                                                                                                                                                                                    • Part of subcall function 0052F9F2: _wcslen.LIBCMT ref: 0052F9FD
                                                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?,005D6BF0,00000061), ref: 00584743
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                  • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                  • Opcode ID: 045060e17fed9ee865c530bf999c969e4fb017f404a13b153530e7888972d2fe
                                                                                                                                                                                                                                  • Instruction ID: 52e427e6f0860e730395d9f9e12390ecf223d89397b3e5b1e8fc89aba3b4b925
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 045060e17fed9ee865c530bf999c969e4fb017f404a13b153530e7888972d2fe
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F2B19D316083039BC710EF28C894A6EBBE5BFA5764F50491DF896E7291E730D985CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                                                                                                                                                                                                  • DragQueryPoint.SHELL32(?,?), ref: 005A9147
                                                                                                                                                                                                                                    • Part of subcall function 005A7674: ClientToScreen.USER32(?,?), ref: 005A769A
                                                                                                                                                                                                                                    • Part of subcall function 005A7674: GetWindowRect.USER32(?,?), ref: 005A7710
                                                                                                                                                                                                                                    • Part of subcall function 005A7674: PtInRect.USER32(?,?,005A8B89), ref: 005A7720
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 005A91B0
                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 005A91BB
                                                                                                                                                                                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 005A91DE
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 005A9225
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 005A923E
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 005A9255
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 005A9277
                                                                                                                                                                                                                                  • DragFinish.SHELL32(?), ref: 005A927E
                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 005A9371
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#^
                                                                                                                                                                                                                                  • API String ID: 221274066-4237971630
                                                                                                                                                                                                                                  • Opcode ID: 5f30679c007cdd16b1e8693ff721ccc44b44fe8e2f45fe8d13d713b40d4e05dc
                                                                                                                                                                                                                                  • Instruction ID: b3122728a10f91d5f26426d0b86c766d0ab4d7bea99136e93a8158366580abd7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5f30679c007cdd16b1e8693ff721ccc44b44fe8e2f45fe8d13d713b40d4e05dc
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3F613771108302AFD701DF54D889DAFBFE8FFD9750F00091AB595962A1DB309A49CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,005ACC08), ref: 005940BB
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 005940CD
                                                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,005ACC08), ref: 005940F2
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,005ACC08), ref: 0059413E
                                                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028,?,005ACC08), ref: 005941A8
                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32(00000009), ref: 00594262
                                                                                                                                                                                                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 005942C8
                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 005942F2
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                  • API String ID: 354098117-199464113
                                                                                                                                                                                                                                  • Opcode ID: 312cf3a8598d726196b391365d5b4c8b8bbedcc036270b727b5f4fe80973994d
                                                                                                                                                                                                                                  • Instruction ID: 03789ed3542460ea0261bb51e8d3475fdb96dce5829b3155b23092bad8d09293
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 312cf3a8598d726196b391365d5b4c8b8bbedcc036270b727b5f4fe80973994d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 84120975A00115AFDF14DF94C888EAEBBB5FF49318F248498E9099B251D731ED86CFA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(005E1990), ref: 00552F8D
                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(005E1990), ref: 0055303D
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00553081
                                                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0055308A
                                                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(005E1990,00000000,?,00000000,00000000,00000000), ref: 0055309D
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 005530A9
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                  • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                  • Opcode ID: 0bf0b179e99ad1848a27375bce4e52cc18e0209f0940dc1bb431f9664887faae
                                                                                                                                                                                                                                  • Instruction ID: af02a0ea856ff7407d1511b743f0a84c1853f589062e0e377b662b911064c1d2
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0bf0b179e99ad1848a27375bce4e52cc18e0209f0940dc1bb431f9664887faae
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 59710C30640206BEFB259F64DC99FAABF68FF06364F204216F9256A1E0C7B1AD54D750
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • DestroyWindow.USER32(00000000,?), ref: 005A6DEB
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 005A6E5F
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 005A6E81
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005A6E94
                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 005A6EB5
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00510000,00000000), ref: 005A6EE4
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005A6EFD
                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 005A6F16
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 005A6F1D
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 005A6F35
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 005A6F4D
                                                                                                                                                                                                                                    • Part of subcall function 00529944: GetWindowLongW.USER32(?,000000EB), ref: 00529952
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                  • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                  • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                  • Opcode ID: 506a175e713a4fc56172da299d6a9a383f13efea5092c41f58e99756c52f6758
                                                                                                                                                                                                                                  • Instruction ID: 3203997087ab0fa708173287b07fd1d54867da02243f37f160fb88a70989983f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 506a175e713a4fc56172da299d6a9a383f13efea5092c41f58e99756c52f6758
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 92715B74144245AFDB25CF18DC84FABBFE9FB9A304F08041DF9998B2A1C770A949DB15
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0058C4B0
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0058C4C3
                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0058C4D7
                                                                                                                                                                                                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0058C4F0
                                                                                                                                                                                                                                  • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0058C533
                                                                                                                                                                                                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0058C549
                                                                                                                                                                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0058C554
                                                                                                                                                                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0058C584
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0058C5DC
                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0058C5F0
                                                                                                                                                                                                                                  • InternetCloseHandle.WININET(00000000), ref: 0058C5FB
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                  • Opcode ID: 0de946ff81234d531bb964b90ed3ced2c8a42ee93e6055016db4283a3cf7c6ac
                                                                                                                                                                                                                                  • Instruction ID: 2b1830867d0f22beec1514f2e3adb9b94de766b10f3f2ae826bf00e9bb3cd1cd
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0de946ff81234d531bb964b90ed3ced2c8a42ee93e6055016db4283a3cf7c6ac
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4F515DB1500205BFEB21AF64C948ABB7FFCFF19754F00441AF945A6210DB34E948AB70
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 005A8592
                                                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 005A85A2
                                                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000), ref: 005A85AD
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005A85BA
                                                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 005A85C8
                                                                                                                                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 005A85D7
                                                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 005A85E0
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005A85E7
                                                                                                                                                                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 005A85F8
                                                                                                                                                                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,005AFC38,?), ref: 005A8611
                                                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 005A8621
                                                                                                                                                                                                                                  • GetObjectW.GDI32(?,00000018,000000FF), ref: 005A8641
                                                                                                                                                                                                                                  • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 005A8671
                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 005A8699
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 005A86AF
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3840717409-0
                                                                                                                                                                                                                                  • Opcode ID: c142638163b670bec78de0c767baafebf5741859c793f1e3d40871ee5266ff19
                                                                                                                                                                                                                                  • Instruction ID: 5f37d3b040e4651022a9867580da52e8007f0476a1de009eac8babf7375f861b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c142638163b670bec78de0c767baafebf5741859c793f1e3d40871ee5266ff19
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9E41E675600208BFDB119FA5DC48EAE7FB8FF9AB11F144059F905EB260DB309905DB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000000), ref: 00581502
                                                                                                                                                                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 0058150B
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00581517
                                                                                                                                                                                                                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 005815FB
                                                                                                                                                                                                                                  • VarR8FromDec.OLEAUT32(?,?), ref: 00581657
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00581708
                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 0058178C
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 005817D8
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 005817E7
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000000), ref: 00581823
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                                  • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                                  • Opcode ID: 9a3d38d32e5b81ba8e8486362f8bbeb01862d5c81780f4cca55b6c5f0e73332a
                                                                                                                                                                                                                                  • Instruction ID: 980ad9e6b04b45b22e0d3514e6d0f2b74c22002dd6da3711dbea11301e905e12
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9a3d38d32e5b81ba8e8486362f8bbeb01862d5c81780f4cca55b6c5f0e73332a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4BD1E271A00916DBDB10AF65E889B7DBFB9BF86700F10846AE846BB180DB30DC46DF55
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059B6AE,?,?), ref: 0059C9B5
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059C9F1
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA68
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA9E
                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059B6F4
                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0059B772
                                                                                                                                                                                                                                  • RegDeleteValueW.ADVAPI32(?,?), ref: 0059B80A
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0059B87E
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0059B89C
                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0059B8F2
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0059B904
                                                                                                                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0059B922
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 0059B983
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0059B994
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                  • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                  • Opcode ID: 6a1a88d45215d4979a5948132567b1484d54f2d3b5c5c73003281dc6ee59eb80
                                                                                                                                                                                                                                  • Instruction ID: 4ec804f3d070aa3baf3fd6b8bd418a48a303274b3022ac858df8b860c9b2d091
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6a1a88d45215d4979a5948132567b1484d54f2d3b5c5c73003281dc6ee59eb80
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B9C17D30204202AFEB10DF14D599F6ABFE5FF84308F14855CE59A4B2A2CB75ED86CB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 005925D8
                                                                                                                                                                                                                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 005925E8
                                                                                                                                                                                                                                  • CreateCompatibleDC.GDI32(?), ref: 005925F4
                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00592601
                                                                                                                                                                                                                                  • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0059266D
                                                                                                                                                                                                                                  • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 005926AC
                                                                                                                                                                                                                                  • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 005926D0
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 005926D8
                                                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 005926E1
                                                                                                                                                                                                                                  • DeleteDC.GDI32(?), ref: 005926E8
                                                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,?), ref: 005926F3
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                  • String ID: (
                                                                                                                                                                                                                                  • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                  • Opcode ID: 1e24d5a985a67cc51925da6848fca18dfbfd742e92b5dd8da6330ac857f3c179
                                                                                                                                                                                                                                  • Instruction ID: 3c1a2fd0e8e0f01e1f23edcf63cf8a97ac779e41231635b2ac480e4f37ea9cc5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1e24d5a985a67cc51925da6848fca18dfbfd742e92b5dd8da6330ac857f3c179
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A061D275E00219EFCF05CFA8D988AAEBBF5FF58310F208529E956A7250D770A941DF90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • ___free_lconv_mon.LIBCMT ref: 0054DAA1
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D659
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D66B
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D67D
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D68F
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6A1
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6B3
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6C5
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6D7
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6E9
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6FB
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D70D
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D71F
                                                                                                                                                                                                                                    • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D731
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DA96
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DAB8
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DACD
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DAD8
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DAFA
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DB0D
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DB1B
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DB26
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DB5E
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DB65
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DB82
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054DB9A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 161543041-0
                                                                                                                                                                                                                                  • Opcode ID: b0c72256c07c906b3235f0667140bc22fb1feb2da4bac7eba9c2409adf76b835
                                                                                                                                                                                                                                  • Instruction ID: 2d6e3b6f5a3c5c42a1fc12d99973f5fba1c2b25e96e381818fc4bf4e6d23e272
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b0c72256c07c906b3235f0667140bc22fb1feb2da4bac7eba9c2409adf76b835
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 28312A316046069FEB22AA3AE849BDA7FF9FF40318F55441AF449D7291DA35AC80CB30
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0057369C
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005736A7
                                                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00573797
                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 0057380C
                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 0057385D
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00573882
                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 005738A0
                                                                                                                                                                                                                                  • ScreenToClient.USER32(00000000), ref: 005738A7
                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00573921
                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 0057395D
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                                  • String ID: %s%u
                                                                                                                                                                                                                                  • API String ID: 4010501982-679674701
                                                                                                                                                                                                                                  • Opcode ID: b091d4a713847a398f5cf6878d371f3e932a002880d4072c36217f3b55f70b25
                                                                                                                                                                                                                                  • Instruction ID: 317b7c397bd0880e0e8153a9bc3f02a8e07af5eaf326be7df6a93a3a6328cd43
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b091d4a713847a398f5cf6878d371f3e932a002880d4072c36217f3b55f70b25
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D991B371204617AFD718DF24D885BAABFA8FF44360F008529FA9DD2190DB30EA45EB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00574994
                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 005749DA
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005749EB
                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,00000000), ref: 005749F7
                                                                                                                                                                                                                                  • _wcsstr.LIBVCRUNTIME ref: 00574A2C
                                                                                                                                                                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00574A64
                                                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00574A9D
                                                                                                                                                                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00574AE6
                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00574B20
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00574B8B
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                  • String ID: ThumbnailClass
                                                                                                                                                                                                                                  • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                  • Opcode ID: 42d577b76fd0bda4483f780d65c0f34e8e3a9897fe1e0805741d6af090705f48
                                                                                                                                                                                                                                  • Instruction ID: 6862e355f64ae1b0f7a1f9936421b4d5cbe64e2ad6600e7fc6a1b810eebfb31d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 42d577b76fd0bda4483f780d65c0f34e8e3a9897fe1e0805741d6af090705f48
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D891AA310042069FDB05DF14E985BAABFE9FF84314F04846AFD899A096EB30ED45DFA1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(005E1990,000000FF,00000000,00000030), ref: 0057BFAC
                                                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(005E1990,00000004,00000000,00000030), ref: 0057BFE1
                                                                                                                                                                                                                                  • Sleep.KERNEL32(000001F4), ref: 0057BFF3
                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(?), ref: 0057C039
                                                                                                                                                                                                                                  • GetMenuItemID.USER32(?,00000000), ref: 0057C056
                                                                                                                                                                                                                                  • GetMenuItemID.USER32(?,-00000001), ref: 0057C082
                                                                                                                                                                                                                                  • GetMenuItemID.USER32(?,?), ref: 0057C0C9
                                                                                                                                                                                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0057C10F
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0057C124
                                                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0057C145
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                  • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                                  • Opcode ID: 0f888608f2cd3f5792d72826a288ff7e39414a32446815aa229eaa86066f0a82
                                                                                                                                                                                                                                  • Instruction ID: 0d42eaf77828a8b02cc286e80f402a9392508cd0b112288fca6330b16e803765
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0f888608f2cd3f5792d72826a288ff7e39414a32446815aa229eaa86066f0a82
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8E6180B0900246AFDF15CF64EC8CAEE7FA8FB45344F408469F859A7291D735AD05EBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0059CC64
                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0059CC8D
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0059CD48
                                                                                                                                                                                                                                    • Part of subcall function 0059CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0059CCAA
                                                                                                                                                                                                                                    • Part of subcall function 0059CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0059CCBD
                                                                                                                                                                                                                                    • Part of subcall function 0059CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0059CCCF
                                                                                                                                                                                                                                    • Part of subcall function 0059CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0059CD05
                                                                                                                                                                                                                                    • Part of subcall function 0059CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0059CD28
                                                                                                                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0059CCF3
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                  • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                  • Opcode ID: a64dd6b452da4cc87a53810dfd57076986f40d08d64c7ba6537ffcaba2ffda7f
                                                                                                                                                                                                                                  • Instruction ID: 76449b2b1065bb2c4135b0473957e9dec6189acc7770e4949f094441577c5f4f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a64dd6b452da4cc87a53810dfd57076986f40d08d64c7ba6537ffcaba2ffda7f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 94316E71A41229BBDB208B54DC88EFFBFBCFF56750F000165E905E6240DB349E49EAA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00583D40
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00583D6D
                                                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00583D9D
                                                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00583DBE
                                                                                                                                                                                                                                  • RemoveDirectoryW.KERNEL32(?), ref: 00583DCE
                                                                                                                                                                                                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00583E55
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00583E60
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00583E6B
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                  • String ID: :$\$\??\%s
                                                                                                                                                                                                                                  • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                  • Opcode ID: c9c863edca603b7c2968325ee53bb6d66d8035e646f3831242a5d39890c550c9
                                                                                                                                                                                                                                  • Instruction ID: 9c2d64e5f8216587f0489e833cde29f80c4912b085c2dabc9663322792831530
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c9c863edca603b7c2968325ee53bb6d66d8035e646f3831242a5d39890c550c9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7D31967550011A6BDB21ABA0DC49FEF3BBCFF89B40F1041B6F905E6150EB7497458B24
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • timeGetTime.WINMM ref: 0057E6B4
                                                                                                                                                                                                                                    • Part of subcall function 0052E551: timeGetTime.WINMM(?,?,0057E6D4), ref: 0052E555
                                                                                                                                                                                                                                  • Sleep.KERNEL32(0000000A), ref: 0057E6E1
                                                                                                                                                                                                                                  • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0057E705
                                                                                                                                                                                                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0057E727
                                                                                                                                                                                                                                  • SetActiveWindow.USER32 ref: 0057E746
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0057E754
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 0057E773
                                                                                                                                                                                                                                  • Sleep.KERNEL32(000000FA), ref: 0057E77E
                                                                                                                                                                                                                                  • IsWindow.USER32 ref: 0057E78A
                                                                                                                                                                                                                                  • EndDialog.USER32(00000000), ref: 0057E79B
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                  • String ID: BUTTON
                                                                                                                                                                                                                                  • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                  • Opcode ID: a494808b6dc206de66f1f48140752f687c2c423c56e22be94da2a861d6eeeb14
                                                                                                                                                                                                                                  • Instruction ID: f073b9751afbd4aa994e19799cc77203efcd0e95fc8a64b490d8719a6423eb07
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a494808b6dc206de66f1f48140752f687c2c423c56e22be94da2a861d6eeeb14
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4B2162B0200385AFEF045F25FCCAA253F6DF77A349F108465F549861A5DFB1AC08BA24
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0057EA5D
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0057EA73
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0057EA84
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0057EA96
                                                                                                                                                                                                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0057EAA7
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: SendString$_wcslen
                                                                                                                                                                                                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                  • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                  • Opcode ID: 61a8cefd10ec93d11d4f7b626158cb2532e02c0f54a0e6227855c869ed93631e
                                                                                                                                                                                                                                  • Instruction ID: b23c9614e526a7b91241434ed60e74c863b90059a5dfcc7ebf550558c172c401
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 61a8cefd10ec93d11d4f7b626158cb2532e02c0f54a0e6227855c869ed93631e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C2115131A5021A79E720A7A5DC5FDFF6F7CFBD5B40F00082BB811A21D1EA701946D9B1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00575CE2
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00575CFB
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00575D59
                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00575D69
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00575D7B
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00575DCF
                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00575DDD
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00575DEF
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00575E31
                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00575E44
                                                                                                                                                                                                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00575E5A
                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00575E67
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3096461208-0
                                                                                                                                                                                                                                  • Opcode ID: df01c4290a76ff926ad615a713a8996397b6e8ad68142963d5adad664806d083
                                                                                                                                                                                                                                  • Instruction ID: 107baca27bcc17ec47cf771bdebb0b3bdca4a7a8fb2cf8d1ceb04834e20c185c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: df01c4290a76ff926ad615a713a8996397b6e8ad68142963d5adad664806d083
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7F51FF71A00615AFDB18CF68DD89AAE7FB9FB58300F548129F91AE7290E7709E04DB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00528F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00528BE8,?,00000000,?,?,?,?,00528BBA,00000000,?), ref: 00528FC5
                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00528C81
                                                                                                                                                                                                                                  • KillTimer.USER32(00000000,?,?,?,?,00528BBA,00000000,?), ref: 00528D1B
                                                                                                                                                                                                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00566973
                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00528BBA,00000000,?), ref: 005669A1
                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00528BBA,00000000,?), ref: 005669B8
                                                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00528BBA,00000000), ref: 005669D4
                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 005669E6
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 641708696-0
                                                                                                                                                                                                                                  • Opcode ID: f24463815d56d80adb4a558604b0bac160634a9bf37ff793da9c8934840065d8
                                                                                                                                                                                                                                  • Instruction ID: 30d0a4b81ba2f000b36e6c4fb785cd3ddd457784389474be67a17238baca1d2b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f24463815d56d80adb4a558604b0bac160634a9bf37ff793da9c8934840065d8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 45618031502B61DFDB259F54EA487397FF1FF62312F144918E082AB5A0CB35AC98EB54
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529944: GetWindowLongW.USER32(?,000000EB), ref: 00529952
                                                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00529862
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ColorLongWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 259745315-0
                                                                                                                                                                                                                                  • Opcode ID: d9ff70b674d20776c70e0103e6a8df3a9f10bd990e5cc0271dfdb4b142fa2434
                                                                                                                                                                                                                                  • Instruction ID: 4cb9e7f3d078a931fe476a7b2be02545f5e048aca7da1330e3f638e743243659
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d9ff70b674d20776c70e0103e6a8df3a9f10bd990e5cc0271dfdb4b142fa2434
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DD41AF31504654AFDB245F38AC88BB93FA5BF27330F184655F9A28B2E2D7319846EB10
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: .S
                                                                                                                                                                                                                                  • API String ID: 0-1539595904
                                                                                                                                                                                                                                  • Opcode ID: 83cfbe8ef4a7bb93c42022b16b1ab8dcbdf33025e2dd58a36ebce130103574f2
                                                                                                                                                                                                                                  • Instruction ID: 4df9f2ad0d55cb23b9e7b728096982678500be7613d02536fa81326fd622d9b8
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 83cfbe8ef4a7bb93c42022b16b1ab8dcbdf33025e2dd58a36ebce130103574f2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: ABC1E174D04249AFDB15DFA8D84ABEEBFB0BF59318F044099F418AB392C7709941CB61
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0055F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00579717
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,0055F7F8,00000001), ref: 00579720
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0055F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00579742
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,0055F7F8,00000001), ref: 00579745
                                                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00579866
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                  • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                  • Opcode ID: af6b7b827216762ec88a924427d34ffe46f42bc3cdc9ffdd9ec789559f132d71
                                                                                                                                                                                                                                  • Instruction ID: 80cc43e4dae3be0c9425749b8b5899d28683a7dc2cdb02409d0af7afc2769872
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: af6b7b827216762ec88a924427d34ffe46f42bc3cdc9ffdd9ec789559f132d71
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7541207280021AAADF14EBE0DD9ADEE7B78BF95340F104425F60572092EB356F89DB71
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 005707A2
                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005707BE
                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005707DA
                                                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00570804
                                                                                                                                                                                                                                  • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0057082C
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00570837
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0057083C
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                  • API String ID: 323675364-22481851
                                                                                                                                                                                                                                  • Opcode ID: c301f0c6cb9751d543b5ef0558e464e761b8ca576a4731dfaf54e9aebf7531cc
                                                                                                                                                                                                                                  • Instruction ID: 24b33ed58f2f657a203f1727a9fedcb3e013658d3200f73d438afd1070e70d02
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c301f0c6cb9751d543b5ef0558e464e761b8ca576a4731dfaf54e9aebf7531cc
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F9411A71C10229EBDF15EFA4DC998EDBBB8FF54350F144526E905A31A1EB30AE44DB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00593C5C
                                                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00593C8A
                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00593C94
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00593D2D
                                                                                                                                                                                                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00593DB1
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00593ED5
                                                                                                                                                                                                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00593F0E
                                                                                                                                                                                                                                  • CoGetObject.OLE32(?,00000000,005AFB98,?), ref: 00593F2D
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00593F40
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00593FC4
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00593FD8
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 429561992-0
                                                                                                                                                                                                                                  • Opcode ID: cf7ae2bac5c9028cb49224f752ac1cdec4d35337ed0afd721d9f73fa068da959
                                                                                                                                                                                                                                  • Instruction ID: 2ab23bee25734d39621ab944db3876b769ad1d3830e7beafb1ce5e955c1a112f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cf7ae2bac5c9028cb49224f752ac1cdec4d35337ed0afd721d9f73fa068da959
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E3C10171608305EFDB00DF68C88492ABBE9FF89744F14491DF98A9B250DB31EE45CB52
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00587AF3
                                                                                                                                                                                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00587B8F
                                                                                                                                                                                                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00587BA3
                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(005AFD08,00000000,00000001,005D6E6C,?), ref: 00587BEF
                                                                                                                                                                                                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00587C74
                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(?,?), ref: 00587CCC
                                                                                                                                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00587D57
                                                                                                                                                                                                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00587D7A
                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00587D81
                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00587DD6
                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00587DDC
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2762341140-0
                                                                                                                                                                                                                                  • Opcode ID: ef0993f72be85da02e4b8527e18a1de93ef582aaae3c1ea953ac539c6ad92c24
                                                                                                                                                                                                                                  • Instruction ID: e0eb0b44b998ba408dac48f68a003ae90e1cc16954d485a252e6de2c1b545eeb
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ef0993f72be85da02e4b8527e18a1de93ef582aaae3c1ea953ac539c6ad92c24
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1DC10B75A04109AFDB14DFA4C888DAEBFF9FF48304B148499E819AB361D731EE45CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 005A5504
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A5515
                                                                                                                                                                                                                                  • CharNextW.USER32(00000158), ref: 005A5544
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 005A5585
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 005A559B
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A55AC
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$CharNext
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1350042424-0
                                                                                                                                                                                                                                  • Opcode ID: d5886003ec15155a33efa9b38eafa08cfe157a35db590d3bee6c0fb55c518d32
                                                                                                                                                                                                                                  • Instruction ID: ea8e2b4be976ada3c33e14a844faf45e9a5f019e2946aaab4e145fcb64cc028e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d5886003ec15155a33efa9b38eafa08cfe157a35db590d3bee6c0fb55c518d32
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D7615931904609EFDF119F64CC84EBE7FB9FB1A720F104545FA25AB290E7748A84DB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0056FAAF
                                                                                                                                                                                                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 0056FB08
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 0056FB1A
                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 0056FB3A
                                                                                                                                                                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 0056FB8D
                                                                                                                                                                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 0056FBA1
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 0056FBB6
                                                                                                                                                                                                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 0056FBC3
                                                                                                                                                                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0056FBCC
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 0056FBDE
                                                                                                                                                                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0056FBE9
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2706829360-0
                                                                                                                                                                                                                                  • Opcode ID: 9356f6dfa460259c161621eaeb9fb15b02d14413d0e097da0380477a65ed9a83
                                                                                                                                                                                                                                  • Instruction ID: 052c8d2941b85b41d45c82aff44a66275088f8fcaffea0f8c130a4442233d49e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9356f6dfa460259c161621eaeb9fb15b02d14413d0e097da0380477a65ed9a83
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B4415F35E002199FCF00DFA4D8589AEBFB9FF59345F008069E906A7261DB70A945DBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00579CA1
                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00579D22
                                                                                                                                                                                                                                  • GetKeyState.USER32(000000A0), ref: 00579D3D
                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00579D57
                                                                                                                                                                                                                                  • GetKeyState.USER32(000000A1), ref: 00579D6C
                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00579D84
                                                                                                                                                                                                                                  • GetKeyState.USER32(00000011), ref: 00579D96
                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00579DAE
                                                                                                                                                                                                                                  • GetKeyState.USER32(00000012), ref: 00579DC0
                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00579DD8
                                                                                                                                                                                                                                  • GetKeyState.USER32(0000005B), ref: 00579DEA
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 541375521-0
                                                                                                                                                                                                                                  • Opcode ID: 8f6b53878ed8cd5fe1f2804be95c920d8f962817de2d43954889e4c7bc82ad7e
                                                                                                                                                                                                                                  • Instruction ID: 685d34758f6ca7475cc448b13190a1fd413ce8ef14e5e60e09656be6af4b914b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8f6b53878ed8cd5fe1f2804be95c920d8f962817de2d43954889e4c7bc82ad7e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1941EB345047C96DFF318764A4043B5BEA47F22344F08C05ADACA575C2EBA49DC8E7B2
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • WSAStartup.WSOCK32(00000101,?), ref: 005905BC
                                                                                                                                                                                                                                  • inet_addr.WSOCK32(?), ref: 0059061C
                                                                                                                                                                                                                                  • gethostbyname.WSOCK32(?), ref: 00590628
                                                                                                                                                                                                                                  • IcmpCreateFile.IPHLPAPI ref: 00590636
                                                                                                                                                                                                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 005906C6
                                                                                                                                                                                                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 005906E5
                                                                                                                                                                                                                                  • IcmpCloseHandle.IPHLPAPI(?), ref: 005907B9
                                                                                                                                                                                                                                  • WSACleanup.WSOCK32 ref: 005907BF
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                  • String ID: Ping
                                                                                                                                                                                                                                  • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                  • Opcode ID: 57ea9d76adbd8cda1ff371c8025f5f70ecf49bf71473f5d630757a9f3533eb26
                                                                                                                                                                                                                                  • Instruction ID: 9f814ae3ae2f078b379af0feebdecb90875333d50973ea182e424a9ce42a4572
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 57ea9d76adbd8cda1ff371c8025f5f70ecf49bf71473f5d630757a9f3533eb26
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F5916C356042019FDB20DF15D488B1ABFE4FF85328F1599A9E4698B6A2C730FD85CF91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                  • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                  • API String ID: 707087890-567219261
                                                                                                                                                                                                                                  • Opcode ID: 9bf8d05e32af8baac46059f62ffa2f4972ba75bb22e3154c9535cd29a3a4b901
                                                                                                                                                                                                                                  • Instruction ID: a53a5601b67f748e7e8b52716f4967f956f04f3a7f262ffda55c86cccd0f5692
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9bf8d05e32af8baac46059f62ffa2f4972ba75bb22e3154c9535cd29a3a4b901
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AC519431A001179BCF24DF6CC9509BEBBA5BF66720B244629E426E73C4DB35DD40C790
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CoInitialize.OLE32 ref: 00593774
                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 0059377F
                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,005AFB78,?), ref: 005937D9
                                                                                                                                                                                                                                  • IIDFromString.OLE32(?,?), ref: 0059384C
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 005938E4
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00593936
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                  • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                  • Opcode ID: c55db850f75ac87a2f66fc61aae2700cba9ce81ecf80317b74ef240c099ae4d2
                                                                                                                                                                                                                                  • Instruction ID: 21e47184bd8155c0ce31768e3ffbbb48a829bf99ac12fd1f2fd0b081e013da92
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c55db850f75ac87a2f66fc61aae2700cba9ce81ecf80317b74ef240c099ae4d2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EB617971608202EFDB10DF54D889B6ABFE8FF89710F004819F9859B291D770EE49CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 005833CF
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 005833F0
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                  • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                                  • Opcode ID: 2c5b753b663f0a139c51f28c0c28e159c0975d32c3bfecdbbcecb43d0f98862c
                                                                                                                                                                                                                                  • Instruction ID: b97928cbf6668750fe2cbab7faf2d9bd8b255a27dcb82d62a7769dcb87649bd9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2c5b753b663f0a139c51f28c0c28e159c0975d32c3bfecdbbcecb43d0f98862c
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EE51B37180020ABAEF15EBA0DD5AEEEBF78BF54740F104466F50572161EB312F98DB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                                  • API String ID: 1256254125-769500911
                                                                                                                                                                                                                                  • Opcode ID: 6c34b784d65c3a51936ad62e978f5782042e8d66e6090e8b84198591dbbcaad6
                                                                                                                                                                                                                                  • Instruction ID: 9d3d8b958fce7c9f6bb1e33cf411d7d3e757fb5e8f625136b9ba80c7532fa462
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6c34b784d65c3a51936ad62e978f5782042e8d66e6090e8b84198591dbbcaad6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2C41FD72A000279BDB205F7DD8906BE7FB5FFA0754B24812AE629D7284E735CD81D790
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 005853A0
                                                                                                                                                                                                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00585416
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00585420
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 005854A7
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                                  • API String ID: 4194297153-14809454
                                                                                                                                                                                                                                  • Opcode ID: 4ac313710d03adff532ea9e41e96507077347536d5ad7b03e5072371345dc921
                                                                                                                                                                                                                                  • Instruction ID: bbbc0acc88e2e69d1789eae54116aef7bc10f5fac25d6c84168142adee5899ab
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4ac313710d03adff532ea9e41e96507077347536d5ad7b03e5072371345dc921
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B4318F35A006059FDB10EF68C488AAA7FF4FF45305F548066E805EB3A2EB71DD86CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateMenu.USER32 ref: 005A3C79
                                                                                                                                                                                                                                  • SetMenu.USER32(?,00000000), ref: 005A3C88
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005A3D10
                                                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 005A3D24
                                                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 005A3D2E
                                                                                                                                                                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 005A3D5B
                                                                                                                                                                                                                                  • DrawMenuBar.USER32 ref: 005A3D63
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                  • String ID: 0$F
                                                                                                                                                                                                                                  • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                  • Opcode ID: 0d2f37f1e57237b641743da74e3f7dc7c0f261496fcb4c8271f0836d73c1a862
                                                                                                                                                                                                                                  • Instruction ID: 27a32d64678b2d3c73eb1829b21462897e1da032068909cd2280e2de5c407997
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0d2f37f1e57237b641743da74e3f7dc7c0f261496fcb4c8271f0836d73c1a862
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 18416879A01209EFDB14CF64D884AAE7FB5FF5A354F140029F946A7360D730AA14DB94
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00571F64
                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32 ref: 00571F6F
                                                                                                                                                                                                                                  • GetParent.USER32 ref: 00571F8B
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00571F8E
                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 00571F97
                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00571FAB
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00571FAE
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                  • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                  • Opcode ID: 6988849035dfbdd36d139ad445dcf7a536a518007fcf593bf0dced547869c3c8
                                                                                                                                                                                                                                  • Instruction ID: a48eb5abc76949db3d1615c25b98a0889183bc080912d25388fa365ffbb7892b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6988849035dfbdd36d139ad445dcf7a536a518007fcf593bf0dced547869c3c8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0421D070900214BBDF11EFA8DC89DEEBFB8BF56350F004116F9656B291DB344908EB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00572043
                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32 ref: 0057204E
                                                                                                                                                                                                                                  • GetParent.USER32 ref: 0057206A
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 0057206D
                                                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 00572076
                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 0057208A
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 0057208D
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                  • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                  • Opcode ID: a6c9aca4f10ac45b3761e12970c75b2eb348c03fa41b191422d441615f6e1d70
                                                                                                                                                                                                                                  • Instruction ID: 86fe38d3784bab02a1d1d80e9a7d5d2409d65192834e0970f793663afd086e34
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a6c9aca4f10ac45b3761e12970c75b2eb348c03fa41b191422d441615f6e1d70
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7621CF71900214BBDF10EFA4DC89EEEBFB8BF15340F004416B996AB2A1DA754958EB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 005A3A9D
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 005A3AA0
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A3AC7
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 005A3AEA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 005A3B62
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 005A3BAC
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 005A3BC7
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 005A3BE2
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 005A3BF6
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 005A3C13
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 312131281-0
                                                                                                                                                                                                                                  • Opcode ID: 6a121adec603426d56cb2149658e46ed74cc961d9af572a72530947eae12d603
                                                                                                                                                                                                                                  • Instruction ID: 54982ee2cc5b44355717b08d8d85a7a00505cbc00a454a5e6c79052ab5caf453
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6a121adec603426d56cb2149658e46ed74cc961d9af572a72530947eae12d603
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D5615975900248AFDB10DFA8CC81EEE7BF8BF4A714F100099FA15AB291C770AE45DB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0057B151
                                                                                                                                                                                                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B165
                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 0057B16C
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B17B
                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0057B18D
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B1A6
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B1B8
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B1FD
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B212
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B21D
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2156557900-0
                                                                                                                                                                                                                                  • Opcode ID: 15b1861ebdf8dcdd26e909d5e305a6190dc6f59cde9608180d4cd08a9552c0f0
                                                                                                                                                                                                                                  • Instruction ID: a050517342d5caed08633f028526d7c7b1b44c480fee28fff55d126ac75abfec
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 15b1861ebdf8dcdd26e909d5e305a6190dc6f59cde9608180d4cd08a9552c0f0
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 72318C75510208AFEB149F24EC8CB6D7FA9BB61311F108455FA09DB191E7B49E48AF60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542C94
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CA0
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CAB
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CB6
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CC1
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CCC
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CD7
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CE2
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CED
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542CFB
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                                                  • Opcode ID: e5bdf43cff454d800f453543dcaf201535a61eb7e43b7195bcc3728197a0cb6d
                                                                                                                                                                                                                                  • Instruction ID: f2b647019b5027eac990fe8d3f060b4f816d861e06b3150a55d4c80a2b105c10
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e5bdf43cff454d800f453543dcaf201535a61eb7e43b7195bcc3728197a0cb6d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DF11C076100119AFDB02EF95D886CDD3FB9FF45354F9144A0FA489B222DA31EE909B90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00587FAD
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00587FC1
                                                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00587FEB
                                                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00588005
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00588017
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00588060
                                                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 005880B0
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                                                  • API String ID: 769691225-438819550
                                                                                                                                                                                                                                  • Opcode ID: 9a0e5fb5a9e78eb493b66398a5808f62e9e483d66d19b361993f78d6c71b18f5
                                                                                                                                                                                                                                  • Instruction ID: 726c6ec4c52bc6c92eed617e448c41a757dd9d9d81981cf118759105984ed499
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9a0e5fb5a9e78eb493b66398a5808f62e9e483d66d19b361993f78d6c71b18f5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9A81A3725082059BDB20FF64C4489BABBE8BF89310F644C5AFC85E7250EB35DD49CB52
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EB), ref: 00515C7A
                                                                                                                                                                                                                                    • Part of subcall function 00515D0A: GetClientRect.USER32(?,?), ref: 00515D30
                                                                                                                                                                                                                                    • Part of subcall function 00515D0A: GetWindowRect.USER32(?,?), ref: 00515D71
                                                                                                                                                                                                                                    • Part of subcall function 00515D0A: ScreenToClient.USER32(?,?), ref: 00515D99
                                                                                                                                                                                                                                  • GetDC.USER32 ref: 005546F5
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00554708
                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00554716
                                                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0055472B
                                                                                                                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00554733
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 005547C4
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                  • String ID: U
                                                                                                                                                                                                                                  • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                  • Opcode ID: 606f041d2381b20eb5b647d1b542239d452e97a4a0ec60724ef10875ce4f5126
                                                                                                                                                                                                                                  • Instruction ID: 6a7442baf897b7f100ead10c7b58d3ad4d9cbc5dbde225e092372e4ab66aa7f3
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 606f041d2381b20eb5b647d1b542239d452e97a4a0ec60724ef10875ce4f5126
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1671DF34400205DFCF258F64C998AEA3FB5FF8A31AF14426AED555A266D7309CCADF50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 005835E4
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • LoadStringW.USER32(005E2390,?,00000FFF,?), ref: 0058360A
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                  • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                                  • Opcode ID: f740b3057fc6fac08b1663d068b5317b56afb3e53c0ca98e25f1983bee0a3a34
                                                                                                                                                                                                                                  • Instruction ID: 01a258eaff1156b73ec1966dd901fbecae17bf0f3fcd8015bee7ecbafa8b6670
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f740b3057fc6fac08b1663d068b5317b56afb3e53c0ca98e25f1983bee0a3a34
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0C516B7180020ABAEF14EBA0DC9AEEDBF38FF54700F144525F515721A1EB306B99DBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0058C272
                                                                                                                                                                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0058C29A
                                                                                                                                                                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0058C2CA
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0058C322
                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?), ref: 0058C336
                                                                                                                                                                                                                                  • InternetCloseHandle.WININET(00000000), ref: 0058C341
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                  • Opcode ID: 98d7d3055c148619287e8690006587210a279fd393ab516df3775419a9338fdd
                                                                                                                                                                                                                                  • Instruction ID: 7790a83be29ec81c6077cf97ffaada539440bc72bc764fc059f9443af2f9ae57
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 98d7d3055c148619287e8690006587210a279fd393ab516df3775419a9338fdd
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 64317FB1500604AFD721AF649C88AAB7FFCFB59744F10891EF886A2240DB34DD099B70
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00553AAF,?,?,Bad directive syntax error,005ACC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 005798BC
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,00553AAF,?), ref: 005798C3
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00579987
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                  • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                  • Opcode ID: cf11680bd29c287107490eb45fe4780d5aca51db3f22cd620debb7e661b1d1b6
                                                                                                                                                                                                                                  • Instruction ID: 3543e181bf1943ab2dec9d3879c9b890ed7313b46a79ed3319eb8e9b89e6397c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cf11680bd29c287107490eb45fe4780d5aca51db3f22cd620debb7e661b1d1b6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3D21943180021BBBDF11AF90DC5AEED7F75FF54300F044826F519620A1EB71AA58EB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetParent.USER32 ref: 005720AB
                                                                                                                                                                                                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 005720C0
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0057214D
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                  • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                  • Opcode ID: e8a184e5a12ad1e1daeace80f8dfb6591ca979f161a6249e322417ef7e8af23c
                                                                                                                                                                                                                                  • Instruction ID: e24e2ee8d6ef4f15f5b1a9a8917e5d0e8b7af0ecbfbba80c76c1da46cb71f507
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e8a184e5a12ad1e1daeace80f8dfb6591ca979f161a6249e322417ef7e8af23c
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9C11597A288307BAF6116229FC0BDA63F9CFB15324F20401BFB09A50D1FE716841BA14
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1282221369-0
                                                                                                                                                                                                                                  • Opcode ID: bbb58e7c0c477021772fb002c53c5e0ac1557e45dd50c393c8a633f0fc5189c7
                                                                                                                                                                                                                                  • Instruction ID: 0c4c8da63d30988a50988f37c33bf85e18892c3feaad86dce66b3f4f2a063d49
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bbb58e7c0c477021772fb002c53c5e0ac1557e45dd50c393c8a633f0fc5189c7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FF618771905312BFDB25AFB49C89AEE7FA5FF81318F04016DF9449B282EB359C489760
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 005A5186
                                                                                                                                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 005A51C7
                                                                                                                                                                                                                                  • ShowWindow.USER32(?,00000005,?,00000000), ref: 005A51CD
                                                                                                                                                                                                                                  • SetFocus.USER32(?,?,00000005,?,00000000), ref: 005A51D1
                                                                                                                                                                                                                                    • Part of subcall function 005A6FBA: DeleteObject.GDI32(00000000), ref: 005A6FE6
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A520D
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005A521A
                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 005A524D
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 005A5287
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 005A5296
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3210457359-0
                                                                                                                                                                                                                                  • Opcode ID: af91222d32c97ee58d4a0023129f4cb45ae7f0fa1f0a1f341734ad401d6bbe70
                                                                                                                                                                                                                                  • Instruction ID: fe7235efff2c23d5327d5b586f3a8d11d5ceac297eb2c576746703b80b7ff7a7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: af91222d32c97ee58d4a0023129f4cb45ae7f0fa1f0a1f341734ad401d6bbe70
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9B517A34A40A09AEEF249F24DC4AFEC3FA5FF57321F144011F6559A2E1E775A984EB40
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00566890
                                                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 005668A9
                                                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 005668B9
                                                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 005668D1
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 005668F2
                                                                                                                                                                                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00528874,00000000,00000000,00000000,000000FF,00000000), ref: 00566901
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0056691E
                                                                                                                                                                                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00528874,00000000,00000000,00000000,000000FF,00000000), ref: 0056692D
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1268354404-0
                                                                                                                                                                                                                                  • Opcode ID: 66e45f2eea7abb2dca242a926c55c8933cb1b674fe93f8eb8f41bae400671fa7
                                                                                                                                                                                                                                  • Instruction ID: 5e0b6f25aa68993db56f952f6c905eec3b766dfcd013a009b4c7cdb023e2328e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 66e45f2eea7abb2dca242a926c55c8933cb1b674fe93f8eb8f41bae400671fa7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B2519570A00609AFDB20CF64DC95BAA3FB5FF9A710F104518F9529B2E0DB70E990EB40
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0058C182
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0058C195
                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?), ref: 0058C1A9
                                                                                                                                                                                                                                    • Part of subcall function 0058C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0058C272
                                                                                                                                                                                                                                    • Part of subcall function 0058C253: GetLastError.KERNEL32 ref: 0058C322
                                                                                                                                                                                                                                    • Part of subcall function 0058C253: SetEvent.KERNEL32(?), ref: 0058C336
                                                                                                                                                                                                                                    • Part of subcall function 0058C253: InternetCloseHandle.WININET(00000000), ref: 0058C341
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 337547030-0
                                                                                                                                                                                                                                  • Opcode ID: cfdfb2378b12210eccc5a6195d0abf4f229cbddccc759d77990079f3f2e33ecd
                                                                                                                                                                                                                                  • Instruction ID: ef4ebc6702325274392a1a6c707f3af78ee6a66c85632095370511702284238e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cfdfb2378b12210eccc5a6195d0abf4f229cbddccc759d77990079f3f2e33ecd
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 46318075200601AFDB21AFB5DC48A66BFF9FF69300B00441DF997A2650DB31E814EB70
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00573A57
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: GetCurrentThreadId.KERNEL32 ref: 00573A5E
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005725B3), ref: 00573A65
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 005725BD
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 005725DB
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 005725DF
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 005725E9
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00572601
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00572605
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 0057260F
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00572623
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00572627
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2014098862-0
                                                                                                                                                                                                                                  • Opcode ID: e960b58145b9f48b7a03b2e116e9c117e650d9a739f5235b9cb96ab3c7203277
                                                                                                                                                                                                                                  • Instruction ID: 6c4d37684ed6d9e3cd017629e0a6cd174e5f0399fcc14a979a4e7f699d898d2d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e960b58145b9f48b7a03b2e116e9c117e650d9a739f5235b9cb96ab3c7203277
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6E01D431390210BBFB1067699C8EF593F59EB9EB12F104001F318AF0D1C9E22449EA69
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00571449,?,?,00000000), ref: 0057180C
                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00571449,?,?,00000000), ref: 00571813
                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00571449,?,?,00000000), ref: 00571828
                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00571449,?,?,00000000), ref: 00571830
                                                                                                                                                                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00571449,?,?,00000000), ref: 00571833
                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00571449,?,?,00000000), ref: 00571843
                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00571449,00000000,?,00571449,?,?,00000000), ref: 0057184B
                                                                                                                                                                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00571449,?,?,00000000), ref: 0057184E
                                                                                                                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,00571874,00000000,00000000,00000000), ref: 00571868
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1957940570-0
                                                                                                                                                                                                                                  • Opcode ID: 09e8468a245220e03fdfcd945d78faa8b3f697f1e8659289c2849273603031c6
                                                                                                                                                                                                                                  • Instruction ID: 46fec11f13f0ccf2d9f6bbdd5053c8cba2646cac1bf36057acf69a3238f3dc8e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 09e8468a245220e03fdfcd945d78faa8b3f697f1e8659289c2849273603031c6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5701BBB5340308BFE710ABA5DC4DF6B3FACEB9AB11F008411FA05DB1A1DA709804DB20
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                  • String ID: }}S$}}S$}}S
                                                                                                                                                                                                                                  • API String ID: 1036877536-895446879
                                                                                                                                                                                                                                  • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                  • Instruction ID: 1f58a2e901280b91e106e65eba6a01f1f909075f1f2f293f49a04c21a9fdcb07
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8DA13671D407869FEB25CE18C8957EEBFF4FF61358F18416EE5859B282C2388985CB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0057D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0057D501
                                                                                                                                                                                                                                    • Part of subcall function 0057D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0057D50F
                                                                                                                                                                                                                                    • Part of subcall function 0057D4DC: CloseHandle.KERNELBASE(00000000), ref: 0057D5DC
                                                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0059A16D
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0059A180
                                                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0059A1B3
                                                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 0059A268
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000), ref: 0059A273
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0059A2C4
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                  • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                  • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                  • Opcode ID: da3ba646be0e545e3d66cd61f8e36c9710ed2ba4b790b89caa0407dddb526da4
                                                                                                                                                                                                                                  • Instruction ID: e0704fa6ca13c87619b056634e1cb1450a27cccd01a9f3c3f23e821b2de89b9e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: da3ba646be0e545e3d66cd61f8e36c9710ed2ba4b790b89caa0407dddb526da4
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5D615E342042429FEB10DF18C498F55BFA1BF94318F14849CE4664B7A2C776ED45CBD2
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 005A3925
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 005A393A
                                                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 005A3954
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A3999
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 005A39C6
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 005A39F4
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                  • String ID: SysListView32
                                                                                                                                                                                                                                  • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                  • Opcode ID: f01334a2a6e1618b05379d73bd6a9e98ff72a4ae3d3d6b655d43d670c74be508
                                                                                                                                                                                                                                  • Instruction ID: a1f9f8aba6b8e4cb58b309b81d8268a2f0420fcd9578ca1bfad196a03ca267d3
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f01334a2a6e1618b05379d73bd6a9e98ff72a4ae3d3d6b655d43d670c74be508
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A641D071A00219ABEB21DF64CC49BEE7FA9FF49354F100526F948E7281D7B49E84CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0057BCFD
                                                                                                                                                                                                                                  • IsMenu.USER32(00000000), ref: 0057BD1D
                                                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 0057BD53
                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(00DA6368), ref: 0057BDA4
                                                                                                                                                                                                                                  • InsertMenuItemW.USER32(00DA6368,?,00000001,00000030), ref: 0057BDCC
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                  • String ID: 0$2
                                                                                                                                                                                                                                  • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                  • Opcode ID: 494da3f4b1aa77ae215433e21e77289b6ffb16378bea6289337b786cb5ad49f7
                                                                                                                                                                                                                                  • Instruction ID: 2c2c97a1fb7455183e1d6cc62613661665a13b37a265714c6c8adc8c2d7d318f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 494da3f4b1aa77ae215433e21e77289b6ffb16378bea6289337b786cb5ad49f7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 72519F70A002059FEB21CFA8E888BAEBFF4BF55314F14C519E419D7291E7719944EB51
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00532D4B
                                                                                                                                                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00532D53
                                                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00532DE1
                                                                                                                                                                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00532E0C
                                                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00532E61
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                  • String ID: &HS$csm
                                                                                                                                                                                                                                  • API String ID: 1170836740-2847240634
                                                                                                                                                                                                                                  • Opcode ID: 60946cf2c6352f6042e4c9637a5862af839fd061c5a36f7a07a9601b591cae74
                                                                                                                                                                                                                                  • Instruction ID: 0bea1da9764ef4f34922b89c5fa33763107bcb5945878550b89b573c13aae0ce
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 60946cf2c6352f6042e4c9637a5862af839fd061c5a36f7a07a9601b591cae74
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C841A434A01609EBCF10DF68C849A9EBFB5BF84324F148555E915AB392D731EE06CBD0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadIconW.USER32(00000000,00007F03), ref: 0057C913
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: IconLoad
                                                                                                                                                                                                                                  • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                  • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                  • Opcode ID: ea2bc0b084ce332786ab556cd7c5520075d54c1e45639393e8a50dd1be2c80e2
                                                                                                                                                                                                                                  • Instruction ID: e212c30a210cf7aa27542c3ff9acd9c788ff0629e0f630f1785aae49e8fb743c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ea2bc0b084ce332786ab556cd7c5520075d54c1e45639393e8a50dd1be2c80e2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EE11EB3168930BBBA7119B54AC82CEA7F9CFF15754B10442FF608A6282D7707D417665
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                  • String ID: 0.0.0.0
                                                                                                                                                                                                                                  • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                  • Opcode ID: f2909701a1f36104c4a9528f267ed85dbf4d72a721e7060cbc784d3146c55ebd
                                                                                                                                                                                                                                  • Instruction ID: ee75dfb84620e70e6cfd8f51af7230fc58ee946da8e1a084ae9e42d6b3fa5ff5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f2909701a1f36104c4a9528f267ed85dbf4d72a721e7060cbc784d3146c55ebd
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AE110A72504115AFDB21AB20AC0EEDE7FBCFF55711F004169F40996091EF759A81AA70
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 952045576-0
                                                                                                                                                                                                                                  • Opcode ID: 91c284f149294394141a96bf077773e97512e10061c01fc198e0c790f3d07584
                                                                                                                                                                                                                                  • Instruction ID: fd9260e992b1fcecdb2533b2e0b1c8fb117d3ad969f22688c65896332eea0067
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 91c284f149294394141a96bf077773e97512e10061c01fc198e0c790f3d07584
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 80418466C1021975CB11EBB4988EACF7BBCBF89710F508466F518E3122FB34E255C7A5
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0056682C,00000004,00000000,00000000), ref: 0052F953
                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0056682C,00000004,00000000,00000000), ref: 0056F3D1
                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0056682C,00000004,00000000,00000000), ref: 0056F454
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ShowWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1268545403-0
                                                                                                                                                                                                                                  • Opcode ID: 555f59884f08ed50073d300ce7ac90860e5ff693b2ecf81badc99e52699361ac
                                                                                                                                                                                                                                  • Instruction ID: 07321a2e70d98a1bac38aea76dd3c6b95a3245066138fbfcc962061d945a9381
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 555f59884f08ed50073d300ce7ac90860e5ff693b2ecf81badc99e52699361ac
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FB410B31608690BAC7398B2DF88872A7FB1BF97314F14483CE087576E1D631A8C4DB11
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 005A2D1B
                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 005A2D23
                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005A2D2E
                                                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 005A2D3A
                                                                                                                                                                                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 005A2D76
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 005A2D87
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,005A5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 005A2DC2
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 005A2DE1
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3864802216-0
                                                                                                                                                                                                                                  • Opcode ID: 826aeedad7eb1065195f62f79de3374bf1494445f255d6e05f40f3e10ce37e8e
                                                                                                                                                                                                                                  • Instruction ID: b6d39b8348042ce4923334a8c5d0a1ebf2a7551c46a4fdac2a551361e7c2b3a7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 826aeedad7eb1065195f62f79de3374bf1494445f255d6e05f40f3e10ce37e8e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 92316972201214BBEB218F548C8AFEB3FA9FB1A715F044055FE089A292C6759C55CBA4
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _memcmp
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2931989736-0
                                                                                                                                                                                                                                  • Opcode ID: 70b45551231ea2c49f2181fb741abaf3fd90eb8826f5753e55158a43b827ec74
                                                                                                                                                                                                                                  • Instruction ID: ce476ce3a50280507b72a00b44a597f3a5bb3df3f37a3004d0808bb695d88dfd
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 70b45551231ea2c49f2181fb741abaf3fd90eb8826f5753e55158a43b827ec74
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 82212961644E0A77D2185521AD96FFE3F5CFF61394F448420FD0E9A581FBA0EE1092E9
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                  • API String ID: 0-572801152
                                                                                                                                                                                                                                  • Opcode ID: 70bce1d01f652fe3e5b6a137a3f6839ccc78ef89e5bbd673c84e2f00c0dc5709
                                                                                                                                                                                                                                  • Instruction ID: 4994603213440e1249d98e5c545af81e94d688fc66b64a5b5c8d9e703bc23fe2
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 70bce1d01f652fe3e5b6a137a3f6839ccc78ef89e5bbd673c84e2f00c0dc5709
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A9D1E271A0060AAFDF11CFA8C885FAEBBB5FF48344F148469E915AB281E770DD55CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCPInfo.KERNEL32(?,?), ref: 005515CE
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00551651
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 005516E4
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 005516FB
                                                                                                                                                                                                                                    • Part of subcall function 00543820: RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00551777
                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 005517A2
                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 005517AE
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2829977744-0
                                                                                                                                                                                                                                  • Opcode ID: e8304211e53872cf78084dfc1e33bd3c4004e3408b64d64a4d2f45e1bf780cc9
                                                                                                                                                                                                                                  • Instruction ID: c04c13829556676bdde93f596624673d63ad07e03a4ba3af2b3dd2827bf6d391
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e8304211e53872cf78084dfc1e33bd3c4004e3408b64d64a4d2f45e1bf780cc9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9D91C671E10A165ADB208E78C8A5BEE7FB5FF49315F18055AEC02E7141EB35DC48CB68
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Variant$ClearInit
                                                                                                                                                                                                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                  • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                  • Opcode ID: 77306e72be91a7ecf0ba1ce4349f5b5347728ad51ca2df2036dff4ae9b387d75
                                                                                                                                                                                                                                  • Instruction ID: 41213f7b4867b2642b7d579067c4a1d108a3a7272f84ede0c31922d5a4a1301b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 77306e72be91a7ecf0ba1ce4349f5b5347728ad51ca2df2036dff4ae9b387d75
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B5917E71A00219ABDF24CFA4D848FAEBFB8FF46715F108559E505AB280D7709D46CFA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0058125C
                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00581284
                                                                                                                                                                                                                                  • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 005812A8
                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 005812D8
                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0058135F
                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 005813C4
                                                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00581430
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2550207440-0
                                                                                                                                                                                                                                  • Opcode ID: 148ef1dbce5227e56b34e09841ee106e26920361c44d50065e1b0d91fa047f87
                                                                                                                                                                                                                                  • Instruction ID: de43210863cf6dd09675dc264b1f14575ccda69dbb8db402c8801cd81d3bf2c4
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 148ef1dbce5227e56b34e09841ee106e26920361c44d50065e1b0d91fa047f87
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7F91E175A006199FDB00EF94C889BBEBFB9FF85311F104429E901FB291D774A946CB98
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3225163088-0
                                                                                                                                                                                                                                  • Opcode ID: 83f3c22fb306f6be88ca3d7481be7fa10cefbf19928e3787af2bff1dfcc73a85
                                                                                                                                                                                                                                  • Instruction ID: 3cb3b983fbfa0f9e69b899443e4a6e3a1e498c1d3afaa14e7ea96eee4cdfe8c9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 83f3c22fb306f6be88ca3d7481be7fa10cefbf19928e3787af2bff1dfcc73a85
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 46910671E00219AFCB14CFA9D888AEEBFB8FF4A320F144555E515B7291D774A941CBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 0059396B
                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00593A7A
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00593A8A
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00593C1F
                                                                                                                                                                                                                                    • Part of subcall function 00580CDF: VariantInit.OLEAUT32(00000000), ref: 00580D1F
                                                                                                                                                                                                                                    • Part of subcall function 00580CDF: VariantCopy.OLEAUT32(?,?), ref: 00580D28
                                                                                                                                                                                                                                    • Part of subcall function 00580CDF: VariantClear.OLEAUT32(?), ref: 00580D34
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                  • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                  • Opcode ID: d1de0cec47eb83c8b73fed0c5b2871f7964d3ad9d0ec9e0fbbb42569a274da58
                                                                                                                                                                                                                                  • Instruction ID: dc642ee4a540e05f302883e646ca5ec0a6347dd7f755bcea8d9dc74af3d1ce25
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d1de0cec47eb83c8b73fed0c5b2871f7964d3ad9d0ec9e0fbbb42569a274da58
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 769136756083069FCB10EF28C49596ABBE5FF89314F14882DF88997351DB30EE45CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0057000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?,?,0057035E), ref: 0057002B
                                                                                                                                                                                                                                    • Part of subcall function 0057000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570046
                                                                                                                                                                                                                                    • Part of subcall function 0057000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570054
                                                                                                                                                                                                                                    • Part of subcall function 0057000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?), ref: 00570064
                                                                                                                                                                                                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00594C51
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00594D59
                                                                                                                                                                                                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00594DCF
                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(?), ref: 00594DDA
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                  • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                  • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                  • Opcode ID: 0d877d0f5680bbfd8bc4b1a12b15a4521c267de10851dd49e1813de6f20319c2
                                                                                                                                                                                                                                  • Instruction ID: 60621b3f739e646e4d965c75ee284f12d03f14d315a975b55d033b0dbefe4138
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0d877d0f5680bbfd8bc4b1a12b15a4521c267de10851dd49e1813de6f20319c2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 80911671D0021AAFDF10DFA4D895EEEBBB8BF48310F108569E919A7241DB309E45CF60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetMenu.USER32(?), ref: 005A2183
                                                                                                                                                                                                                                  • GetMenuItemCount.USER32(00000000), ref: 005A21B5
                                                                                                                                                                                                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 005A21DD
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A2213
                                                                                                                                                                                                                                  • GetMenuItemID.USER32(?,?), ref: 005A224D
                                                                                                                                                                                                                                  • GetSubMenu.USER32(?,?), ref: 005A225B
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00573A57
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: GetCurrentThreadId.KERNEL32 ref: 00573A5E
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005725B3), ref: 00573A65
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005A22E3
                                                                                                                                                                                                                                    • Part of subcall function 0057E97B: Sleep.KERNEL32 ref: 0057E9F3
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4196846111-0
                                                                                                                                                                                                                                  • Opcode ID: 53e36e2993b9f00c0cef0959bd2ffbd06f097c43b64f420f4058ee9d107a7b3c
                                                                                                                                                                                                                                  • Instruction ID: c20852dbd681ee844113cfb4df46e37ba3a5a5cefbeecbe0b2aa2c3e45403db4
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 53e36e2993b9f00c0cef0959bd2ffbd06f097c43b64f420f4058ee9d107a7b3c
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 55714B75A00215AFCB10DF68C846AAEBFF5BF8A310F148469E916AB351DB34ED418B90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • IsWindow.USER32(00DA6430), ref: 005A7F37
                                                                                                                                                                                                                                  • IsWindowEnabled.USER32(00DA6430), ref: 005A7F43
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 005A801E
                                                                                                                                                                                                                                  • SendMessageW.USER32(00DA6430,000000B0,?,?), ref: 005A8051
                                                                                                                                                                                                                                  • IsDlgButtonChecked.USER32(?,?), ref: 005A8089
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(00DA6430,000000EC), ref: 005A80AB
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 005A80C3
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4072528602-0
                                                                                                                                                                                                                                  • Opcode ID: d87aec16feb92479b5353dc36a41eb92670cc3dde134ae5ce6792a76c3e342d5
                                                                                                                                                                                                                                  • Instruction ID: e6b27c16929c0c9da5fd5348c41c6e9a936cb2a796b9d50470e2dde8bed12b99
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d87aec16feb92479b5353dc36a41eb92670cc3dde134ae5ce6792a76c3e342d5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1771AB34608248AFEB219F64CC88FBEBFB9FF5B300F144459E95597261CB31AA44DB20
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetParent.USER32(?), ref: 0057AEF9
                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 0057AF0E
                                                                                                                                                                                                                                  • SetKeyboardState.USER32(?), ref: 0057AF6F
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 0057AF9D
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 0057AFBC
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 0057AFFD
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0057B020
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 87235514-0
                                                                                                                                                                                                                                  • Opcode ID: 4f1173effa0c305a0a07e059feb70ada640a78b3b7c93d56ff0aa68b6667f26a
                                                                                                                                                                                                                                  • Instruction ID: 7be483fbd37eb13ca928255f13004dd394cd7099eaf4d2ad01014ca44ad8056f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4f1173effa0c305a0a07e059feb70ada640a78b3b7c93d56ff0aa68b6667f26a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4351D1A06087D53DFB3682349C49BBEBEA96B46304F08C589E1DD958C3D398ACC8E751
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetParent.USER32(00000000), ref: 0057AD19
                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 0057AD2E
                                                                                                                                                                                                                                  • SetKeyboardState.USER32(?), ref: 0057AD8F
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0057ADBB
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0057ADD8
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0057AE17
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0057AE38
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 87235514-0
                                                                                                                                                                                                                                  • Opcode ID: c43deac456268518980e2d445fc184cb9d67f655e4d90ae42bd94ce82bec954f
                                                                                                                                                                                                                                  • Instruction ID: 2a5d4e7a1b1f96e325617f309cc14afbe8a8c276494c597c50560d8cea99cd91
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c43deac456268518980e2d445fc184cb9d67f655e4d90ae42bd94ce82bec954f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8D51B3A15047D53DFB3783249C55BBE7EA97B86300F08C589E5DD868C2D294EC88F762
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetConsoleCP.KERNEL32(00553CD6,?,?,?,?,?,?,?,?,00545BA3,?,?,00553CD6,?,?), ref: 00545470
                                                                                                                                                                                                                                  • __fassign.LIBCMT ref: 005454EB
                                                                                                                                                                                                                                  • __fassign.LIBCMT ref: 00545506
                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00553CD6,00000005,00000000,00000000), ref: 0054552C
                                                                                                                                                                                                                                  • WriteFile.KERNEL32(?,00553CD6,00000000,00545BA3,00000000,?,?,?,?,?,?,?,?,?,00545BA3,?), ref: 0054554B
                                                                                                                                                                                                                                  • WriteFile.KERNEL32(?,?,00000001,00545BA3,00000000,?,?,?,?,?,?,?,?,?,00545BA3,?), ref: 00545584
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1324828854-0
                                                                                                                                                                                                                                  • Opcode ID: 682d5176a5f3b3f1c0d048d993e3aceda236afee3b24c48ac106d56ed995fb66
                                                                                                                                                                                                                                  • Instruction ID: 24808c6eb1eebcecf855a58c8dca5a9990f6fc865d75660e9bc5a7327662084e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 682d5176a5f3b3f1c0d048d993e3aceda236afee3b24c48ac106d56ed995fb66
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4B51E270A00649AFDB11CFA8D885AEEBFF9FF09304F14451AF955E7292E7309A41CB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0059304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0059307A
                                                                                                                                                                                                                                    • Part of subcall function 0059304E: _wcslen.LIBCMT ref: 0059309B
                                                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00591112
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00591121
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 005911C9
                                                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 005911F9
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2675159561-0
                                                                                                                                                                                                                                  • Opcode ID: 52c1d0984418bdefbaf55567892f54968910bd33872977c18160b35f4cdbc218
                                                                                                                                                                                                                                  • Instruction ID: 04beafee710abd91a90cd2a77743609229ea6634105e9c3ca98ffbced2de8dcd
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 52c1d0984418bdefbaf55567892f54968910bd33872977c18160b35f4cdbc218
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7C412531600616AFEB109F14C888BA9BFE9FF85324F148059FD169B291C774ED85DBE4
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0057DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0057CF22,?), ref: 0057DDFD
                                                                                                                                                                                                                                    • Part of subcall function 0057DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0057CF22,?), ref: 0057DE16
                                                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 0057CF45
                                                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0057CF7F
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0057D005
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0057D01B
                                                                                                                                                                                                                                  • SHFileOperationW.SHELL32(?), ref: 0057D061
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                                                  • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                  • Opcode ID: b2adf41d0e0980f70a79bc6dd2825a0315901cbbea0c00f4b0856cc63b38b3cf
                                                                                                                                                                                                                                  • Instruction ID: ada66f8667195852e43d9519554c622855c0565a0c124dc18f69882a95181e2f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b2adf41d0e0980f70a79bc6dd2825a0315901cbbea0c00f4b0856cc63b38b3cf
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FA4158719052195FDF12EFA4D985BDD7FB8BF49340F0040E6E509E7141EA34A688DB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 005A2E1C
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A2E4F
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A2E84
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 005A2EB6
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 005A2EE0
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A2EF1
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005A2F0B
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2178440468-0
                                                                                                                                                                                                                                  • Opcode ID: a10d1cbca326467a2bf8d54234813347081dd57b8fbb8e05d43d1b0f40771c60
                                                                                                                                                                                                                                  • Instruction ID: 1ece014ebc33cc210ac4a3980a161cae4336022ef94b4a8af5ac0834027a5871
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a10d1cbca326467a2bf8d54234813347081dd57b8fbb8e05d43d1b0f40771c60
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EC31E230604150AFDB25CF5CDC86F693BE9FBAA710F150164F944CF2A2CB71A884EB41
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00577769
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0057778F
                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00577792
                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 005777B0
                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 005777B9
                                                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 005777DE
                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 005777EC
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3761583154-0
                                                                                                                                                                                                                                  • Opcode ID: 30a8af65b575c4b32c49ff329ad1760fcc9de2236d179f69995b760978716db4
                                                                                                                                                                                                                                  • Instruction ID: 2c3f50426a146e8d2bc7d00069235f1cea404695fe4d317a572107786424b804
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 30a8af65b575c4b32c49ff329ad1760fcc9de2236d179f69995b760978716db4
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CA21AE7660421DAFDF14DFA8EC88CBB7BACFB0E3647008425BA18DB190D670DC469764
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00577842
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00577868
                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 0057786B
                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32 ref: 0057788C
                                                                                                                                                                                                                                  • SysFreeString.OLEAUT32 ref: 00577895
                                                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 005778AF
                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 005778BD
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3761583154-0
                                                                                                                                                                                                                                  • Opcode ID: cc185604e047de12a57dd6470c16ed096679ee3e92bbbc545b7fb8b96b268a20
                                                                                                                                                                                                                                  • Instruction ID: f04f6c16220ee9e93ed60939c5d961383f60e93ca6d7507fa7efb3135eb97a5d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cc185604e047de12a57dd6470c16ed096679ee3e92bbbc545b7fb8b96b268a20
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A0215E31608219AF9F109BA8EC8CDBA7BECFB0D7607108125B919CB2A1DA74DC45DB65
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 005804F2
                                                                                                                                                                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0058052E
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CreateHandlePipe
                                                                                                                                                                                                                                  • String ID: nul
                                                                                                                                                                                                                                  • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                  • Opcode ID: 9163fb88ef69ad07d9bcbf2d9abde371c666f0f824b76126871922de985afc78
                                                                                                                                                                                                                                  • Instruction ID: 9c7d3147b386a8114e02b5750a2c6f5bd12c813dd4f1ddfa126cea67167ce39d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9163fb88ef69ad07d9bcbf2d9abde371c666f0f824b76126871922de985afc78
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 90212C75600305AFDF60AF69D844A9A7FE4BF55724F204A19ECA1E62E0E7709948DF30
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 005805C6
                                                                                                                                                                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00580601
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CreateHandlePipe
                                                                                                                                                                                                                                  • String ID: nul
                                                                                                                                                                                                                                  • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                  • Opcode ID: 469c7f529e6904b28756ad76fc6052d83c925d50faf29598e57948f3ca456fbc
                                                                                                                                                                                                                                  • Instruction ID: e5c723a863d6c6fe7cf82ad9c551b56497688e16fb38169c5e756eea4dd4cab2
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 469c7f529e6904b28756ad76fc6052d83c925d50faf29598e57948f3ca456fbc
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AB2153755003059FDB60AF6A9C04A6A7FE4BF95720F205B19FCA1F72E0E7709969CB20
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0051600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0051604C
                                                                                                                                                                                                                                    • Part of subcall function 0051600E: GetStockObject.GDI32(00000011), ref: 00516060
                                                                                                                                                                                                                                    • Part of subcall function 0051600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0051606A
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 005A4112
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 005A411F
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 005A412A
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 005A4139
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 005A4145
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                  • String ID: Msctls_Progress32
                                                                                                                                                                                                                                  • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                  • Opcode ID: 12330973ad5a0c88b0ba4e5418dedbe544a927d7a456d07af947f54c5f628b4f
                                                                                                                                                                                                                                  • Instruction ID: cb4d0cc8cb859647043195d014e59a02076571dedb0c9a3cb7cb2736a4013ce4
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 12330973ad5a0c88b0ba4e5418dedbe544a927d7a456d07af947f54c5f628b4f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8311B6B114011D7EEF118FA4CC85EEB7F5DFF59798F004111B618A6150C6729C61DBA4
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0054D7A3: _free.LIBCMT ref: 0054D7CC
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D82D
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D838
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D843
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D897
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D8A2
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D8AD
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D8B8
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                                                  • Opcode ID: eef9f0f7ce89c446af916082ef0dcf5a34906bd0a27450ed26007c2b7c5374a1
                                                                                                                                                                                                                                  • Instruction ID: 417ec84ad38db8e74e8797b67926e58fb58d938e5b93832e5d11f6772c22c25f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: eef9f0f7ce89c446af916082ef0dcf5a34906bd0a27450ed26007c2b7c5374a1
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1B114F71540B15ABE921BFB1CC4BFCB7FFCBF80704F800825B29DA6192DA79B5454660
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0057DA74
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000), ref: 0057DA7B
                                                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0057DA91
                                                                                                                                                                                                                                  • LoadStringW.USER32(00000000), ref: 0057DA98
                                                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0057DADC
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 0057DAB9
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                  • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                  • Opcode ID: a3e50674b9392eec5578a4a4c1b0e4618bff2f7d6d3b45e7e0f1088cc93f5f71
                                                                                                                                                                                                                                  • Instruction ID: 47a6e13620e782190c6b3c9374313eeff20332fda4825a87478aa119a98b56a1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a3e50674b9392eec5578a4a4c1b0e4618bff2f7d6d3b45e7e0f1088cc93f5f71
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 560167F25002087FEB10D7A49D89EEB3BBCFB05301F404456B709E2041E6749E849F74
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(00D9EC68,00D9EC68), ref: 0058097B
                                                                                                                                                                                                                                  • EnterCriticalSection.KERNEL32(00D9EC48,00000000), ref: 0058098D
                                                                                                                                                                                                                                  • TerminateThread.KERNEL32(?,000001F6), ref: 0058099B
                                                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(?,000003E8), ref: 005809A9
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 005809B8
                                                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(00D9EC68,000001F6), ref: 005809C8
                                                                                                                                                                                                                                  • LeaveCriticalSection.KERNEL32(00D9EC48), ref: 005809CF
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3495660284-0
                                                                                                                                                                                                                                  • Opcode ID: 66175c213383191e2dcd659fa7aa0d598061f62dae75511bcaf649f8666eeec4
                                                                                                                                                                                                                                  • Instruction ID: 0b7a1e224bf35d8a7f398d5ecd0e6b4f17d5088d86843c90ea5afdf2fb671657
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 66175c213383191e2dcd659fa7aa0d598061f62dae75511bcaf649f8666eeec4
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 57F03C32542A02BBD7415FA4EE8CBE6BF39FF12702F402025F202A18A0CB749469DF90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00515D30
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00515D71
                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00515D99
                                                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00515ED7
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00515EF8
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1296646539-0
                                                                                                                                                                                                                                  • Opcode ID: 55ba09df899d0c638a916fd0e56a3c414496e136664193bddbebce17eb8d1f6b
                                                                                                                                                                                                                                  • Instruction ID: c7d7fc1143cd14310f257dc9f45e312d369d90796f03a5c7a261fc8d267bacc6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 55ba09df899d0c638a916fd0e56a3c414496e136664193bddbebce17eb8d1f6b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 92B17C34A0074ADBDB10CFA8C4807EEBBF5FF58314F14891AE8A9D7250E730AA95DB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • __allrem.LIBCMT ref: 005400BA
                                                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005400D6
                                                                                                                                                                                                                                  • __allrem.LIBCMT ref: 005400ED
                                                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0054010B
                                                                                                                                                                                                                                  • __allrem.LIBCMT ref: 00540122
                                                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00540140
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1992179935-0
                                                                                                                                                                                                                                  • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                  • Instruction ID: 8e23473207f57ba74eec83dc3c1ed4eca54db54e1dc9b9ce217cb2f8d7501e95
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B081F871A007069BE724AE39CC49BAB7FE9BF91328F24553AF951D76C1E770D9008B50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00593149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,0059101C,00000000,?,?,00000000), ref: 00593195
                                                                                                                                                                                                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00591DC0
                                                                                                                                                                                                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00591DE1
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00591DF2
                                                                                                                                                                                                                                  • inet_ntoa.WSOCK32(?), ref: 00591E8C
                                                                                                                                                                                                                                  • htons.WSOCK32(?,?,?,?,?), ref: 00591EDB
                                                                                                                                                                                                                                  • _strlen.LIBCMT ref: 00591F35
                                                                                                                                                                                                                                    • Part of subcall function 005739E8: _strlen.LIBCMT ref: 005739F2
                                                                                                                                                                                                                                    • Part of subcall function 00516D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,0052CF58,?,?,?), ref: 00516DBA
                                                                                                                                                                                                                                    • Part of subcall function 00516D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,0052CF58,?,?,?), ref: 00516DED
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1923757996-0
                                                                                                                                                                                                                                  • Opcode ID: 95dce15d863a9aa931d401370d680609f7948405a584e1010a0daf0dd5ff7591
                                                                                                                                                                                                                                  • Instruction ID: 2c453095c02d1d33421350a442251758ee16b73a13de28296ac07b33187f6ea4
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 95dce15d863a9aa931d401370d680609f7948405a584e1010a0daf0dd5ff7591
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1DA1FF31104712AFDB14DB20C889E6A7FA5BFC4318F54894CF4565B2E2DB31ED86CB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005382D9,005382D9,?,?,?,0054644F,00000001,00000001,8BE85006), ref: 00546258
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0054644F,00000001,00000001,8BE85006,?,?,?), ref: 005462DE
                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 005463D8
                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 005463E5
                                                                                                                                                                                                                                    • Part of subcall function 00543820: RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 005463EE
                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 00546413
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1414292761-0
                                                                                                                                                                                                                                  • Opcode ID: aaab3657ba961c92df682226c7d01fa4ad07365ca3ccf535e5004d626b7b0eb4
                                                                                                                                                                                                                                  • Instruction ID: 3fbf251d5f23bc9fb632ed8b9185025db5f5fafee3f0279a8ec4fe322b68717f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: aaab3657ba961c92df682226c7d01fa4ad07365ca3ccf535e5004d626b7b0eb4
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5751DE72600256ABEB258E64DC85FEF7FA9FB86718F144A29F805D7190DB34DC40C6A1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059B6AE,?,?), ref: 0059C9B5
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059C9F1
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA68
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA9E
                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059BCCA
                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0059BD25
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0059BD6A
                                                                                                                                                                                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0059BD99
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0059BDF3
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0059BDFF
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1120388591-0
                                                                                                                                                                                                                                  • Opcode ID: dee6fc16c76a1dc00b263237ad1ed706076fb4e4da9cbd0a05baec74b5c1a870
                                                                                                                                                                                                                                  • Instruction ID: 2a9319274df48716c95288e4857821f2f203e22104ad1a171ec66022f79a0c6c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: dee6fc16c76a1dc00b263237ad1ed706076fb4e4da9cbd0a05baec74b5c1a870
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7B819D30108242AFE714DF24D995E6ABFE9FF85308F14895CF4594B2A2DB31ED45CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000035), ref: 0056F7B9
                                                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000001), ref: 0056F860
                                                                                                                                                                                                                                  • VariantCopy.OLEAUT32(0056FA64,00000000), ref: 0056F889
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(0056FA64), ref: 0056F8AD
                                                                                                                                                                                                                                  • VariantCopy.OLEAUT32(0056FA64,00000000), ref: 0056F8B1
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 0056F8BB
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3859894641-0
                                                                                                                                                                                                                                  • Opcode ID: f817c579a5261397b4948ee04a2e17cf52ee271edbbce01a0ff72a991b5af2cd
                                                                                                                                                                                                                                  • Instruction ID: bd3130b51eb21b362942704d5d13f4857b70a6ea9e97e5f70fdf2f0b091cf2e1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f817c579a5261397b4948ee04a2e17cf52ee271edbbce01a0ff72a991b5af2cd
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AA51C831E00311BBDF20AB65F899B69BFA9FF95310F245866E905DF291DB708C40C766
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                  • GetOpenFileNameW.COMDLG32(00000058), ref: 005894E5
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00589506
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0058952D
                                                                                                                                                                                                                                  • GetSaveFileNameW.COMDLG32(00000058), ref: 00589585
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                  • String ID: X
                                                                                                                                                                                                                                  • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                  • Opcode ID: 3c872663824bfd4400dc09ac030b393a0e9e2f6d2ee94d2bb4425de111b9c2d7
                                                                                                                                                                                                                                  • Instruction ID: 11df7cf4072da922e408185763d5ec414add65fba783ca5403043dd5de1535b1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3c872663824bfd4400dc09ac030b393a0e9e2f6d2ee94d2bb4425de111b9c2d7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 51E1B5315043019FD714EF24C885AAEBBE4BFC5314F18896DF8999B2A2DB31ED45CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                                                                                                                                                                                                  • BeginPaint.USER32(?,?,?), ref: 00529241
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 005292A5
                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 005292C2
                                                                                                                                                                                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005292D3
                                                                                                                                                                                                                                  • EndPaint.USER32(?,?,?,?,?), ref: 00529321
                                                                                                                                                                                                                                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 005671EA
                                                                                                                                                                                                                                    • Part of subcall function 00529339: BeginPath.GDI32(00000000), ref: 00529357
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3050599898-0
                                                                                                                                                                                                                                  • Opcode ID: 600491df042dabb187265537b9008f717c858d08481e37eaf564b22aa9983ebe
                                                                                                                                                                                                                                  • Instruction ID: 027379cd50156cfc62f615645239b1b77b58bb2120b6ee5cc23bfec4bf28e176
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 600491df042dabb187265537b9008f717c858d08481e37eaf564b22aa9983ebe
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C1419F31104255AFD710DF24D884FBA7FA8FFAA724F140629F994CB2E2C7309849EB61
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 0058080C
                                                                                                                                                                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00580847
                                                                                                                                                                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00580863
                                                                                                                                                                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 005808DC
                                                                                                                                                                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 005808F3
                                                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00580921
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3368777196-0
                                                                                                                                                                                                                                  • Opcode ID: 5b3b7a8bcfec88480fe6c2be9df9e9d4d0eb08c86ae5981afdee7790d539bb41
                                                                                                                                                                                                                                  • Instruction ID: 4500ba0523c5062cea205dafcd198b214d5d59c943d0a2c7110aba8eaec8f3da
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5b3b7a8bcfec88480fe6c2be9df9e9d4d0eb08c86ae5981afdee7790d539bb41
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34415B71A00205EBDF55AF54EC85AAA7B78FF45310F1440B9ED00AA297DB30DE69DBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0056F3AB,00000000,?,?,00000000,?,0056682C,00000004,00000000,00000000), ref: 005A824C
                                                                                                                                                                                                                                  • EnableWindow.USER32(?,00000000), ref: 005A8272
                                                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000), ref: 005A82D1
                                                                                                                                                                                                                                  • ShowWindow.USER32(?,00000004), ref: 005A82E5
                                                                                                                                                                                                                                  • EnableWindow.USER32(?,00000001), ref: 005A830B
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 005A832F
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 642888154-0
                                                                                                                                                                                                                                  • Opcode ID: 302fec1ea4a281543b8c0a1868243c3f5b1eb525ff7c0e8d4391959ef76cc2c5
                                                                                                                                                                                                                                  • Instruction ID: 1e32dd9f8b9f24350eac1461971b1f38191ecfe6c4d8894e7d7143417267ca4d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 302fec1ea4a281543b8c0a1868243c3f5b1eb525ff7c0e8d4391959ef76cc2c5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BC419F34601A44AFDF25CF14DC99BB87FE0BF5BB14F1851A9E6488F2A2CB31A845DB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • IsWindowVisible.USER32(?), ref: 00574C95
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00574CB2
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00574CEA
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00574D08
                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00574D10
                                                                                                                                                                                                                                  • _wcsstr.LIBVCRUNTIME ref: 00574D1A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 72514467-0
                                                                                                                                                                                                                                  • Opcode ID: a49d60e4cd63a45b0a780c4355234476869504beadc5f3e67331c6e240159dcd
                                                                                                                                                                                                                                  • Instruction ID: ea13f0270ee074d96add9a742b390796300102f201a5ab985024bad39e9a3012
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a49d60e4cd63a45b0a780c4355234476869504beadc5f3e67331c6e240159dcd
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BD21DA31204111BBEB269B39BC49E7B7FACEF46750F108079F809CE191EB61DC00ABA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00513AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00513A97,?,?,00512E7F,?,?,?,00000000), ref: 00513AC2
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0058587B
                                                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00585995
                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(005AFCF8,00000000,00000001,005AFB68,?), ref: 005859AE
                                                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 005859CC
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                  • String ID: .lnk
                                                                                                                                                                                                                                  • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                  • Opcode ID: 66add4af07420ba6520e94311120401a5537471fe4e827a8e4178f8d80feeec8
                                                                                                                                                                                                                                  • Instruction ID: df1f498cf2d8dc26ba8d104b54e7ceb7076030961fc1a982c014677c50aa6180
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 66add4af07420ba6520e94311120401a5537471fe4e827a8e4178f8d80feeec8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7DD155716046029FC714EF24C484A6ABBF6FF89715F14485DF88AAB361EB31EC45CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00570FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00570FCA
                                                                                                                                                                                                                                    • Part of subcall function 00570FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00570FD6
                                                                                                                                                                                                                                    • Part of subcall function 00570FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00570FE5
                                                                                                                                                                                                                                    • Part of subcall function 00570FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00570FEC
                                                                                                                                                                                                                                    • Part of subcall function 00570FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00571002
                                                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000000,00571335), ref: 005717AE
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005717BA
                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 005717C1
                                                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 005717DA
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00571335), ref: 005717EE
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 005717F5
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3008561057-0
                                                                                                                                                                                                                                  • Opcode ID: 4da0a6e0e45fd49973f8ec42e1f887c681cf1f5190ee6c258dc5d49234eb325e
                                                                                                                                                                                                                                  • Instruction ID: a306c3febc59018670b8c3e746feebefba4651decdf4236d2cc456a286eb8a99
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4da0a6e0e45fd49973f8ec42e1f887c681cf1f5190ee6c258dc5d49234eb325e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7111BE71600605FFDB189FA8EC49BAE7FA9FB42355F108018F44597210C735A948EB64
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 005714FF
                                                                                                                                                                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00571506
                                                                                                                                                                                                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00571515
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000004), ref: 00571520
                                                                                                                                                                                                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0057154F
                                                                                                                                                                                                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00571563
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1413079979-0
                                                                                                                                                                                                                                  • Opcode ID: 0c0604779c7198e041c0ac53323d7efa6ea176cf0264872020bb5f81644529f7
                                                                                                                                                                                                                                  • Instruction ID: 3de88d6edb35001512216c03d84204cd82d6485c888df2724c75c87a67a78cfc
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0c0604779c7198e041c0ac53323d7efa6ea176cf0264872020bb5f81644529f7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FF112972500209ABDF118F98ED49FDE7FAAFF49744F048059FA09A2160C3758E68EB64
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00533379,00532FE5), ref: 00533390
                                                                                                                                                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0053339E
                                                                                                                                                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005333B7
                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,00533379,00532FE5), ref: 00533409
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3852720340-0
                                                                                                                                                                                                                                  • Opcode ID: 0814a7d5790b763d352e923930218a73e478aee21eca2a61569909e4f3576635
                                                                                                                                                                                                                                  • Instruction ID: f693e8de9a1fddd44ff4ea10a9246f772a41f29b1619651dd54edb8fdbc2cff6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0814a7d5790b763d352e923930218a73e478aee21eca2a61569909e4f3576635
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4201243320A313BEAB2527757C8E66B6F94FB65379F20862BF411812F0EF115D09E544
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00545686,00553CD6,?,00000000,?,00545B6A,?,?,?,?,?,0053E6D1,?,005D8A48), ref: 00542D78
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542DAB
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542DD3
                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,0053E6D1,?,005D8A48,00000010,00514F4A,?,?,00000000,00553CD6), ref: 00542DE0
                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,0053E6D1,?,005D8A48,00000010,00514F4A,?,?,00000000,00553CD6), ref: 00542DEC
                                                                                                                                                                                                                                  • _abort.LIBCMT ref: 00542DF2
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3160817290-0
                                                                                                                                                                                                                                  • Opcode ID: 1cb994cee6c49f6396bb37f906bad7de69e7160a1eaf9399dccbabde44ef99aa
                                                                                                                                                                                                                                  • Instruction ID: f5cbab5f9bf341c041b5f3053ea48a15feefdc3825c3808692b893db0908a8b7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1cb994cee6c49f6396bb37f906bad7de69e7160a1eaf9399dccbabde44ef99aa
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 02F0F935905A2227C72223356C0EBDA3E65BFD276CF640416F424921D1DE7088065120
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00529693
                                                                                                                                                                                                                                    • Part of subcall function 00529639: SelectObject.GDI32(?,00000000), ref: 005296A2
                                                                                                                                                                                                                                    • Part of subcall function 00529639: BeginPath.GDI32(?), ref: 005296B9
                                                                                                                                                                                                                                    • Part of subcall function 00529639: SelectObject.GDI32(?,00000000), ref: 005296E2
                                                                                                                                                                                                                                  • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 005A8A4E
                                                                                                                                                                                                                                  • LineTo.GDI32(?,00000003,00000000), ref: 005A8A62
                                                                                                                                                                                                                                  • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 005A8A70
                                                                                                                                                                                                                                  • LineTo.GDI32(?,00000000,00000003), ref: 005A8A80
                                                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 005A8A90
                                                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 005A8AA0
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 43455801-0
                                                                                                                                                                                                                                  • Opcode ID: 880811f625384f7cafed96dc88a10d03216ccd5bd4fa63b78743ad497293b7c0
                                                                                                                                                                                                                                  • Instruction ID: d6a9bafa926ed9261b32c204509212f39831f4894a095bc47e0e22db3f1a9880
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 880811f625384f7cafed96dc88a10d03216ccd5bd4fa63b78743ad497293b7c0
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 12110976000149FFDB129F90DC88EAE7FACFB1A350F008052BA199A1A1C7719D59EBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00575218
                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00575229
                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00575230
                                                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00575238
                                                                                                                                                                                                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0057524F
                                                                                                                                                                                                                                  • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00575261
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CapsDevice$Release
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1035833867-0
                                                                                                                                                                                                                                  • Opcode ID: ce413d83f2e67e5c5b2219b6865e6ddd81dea95bc3f1141dc53e6be5b01bbaae
                                                                                                                                                                                                                                  • Instruction ID: ad0b1388eaca1b18f430a971a13d0f30a7ef8ad6dc48fd6bf1e412b1780d21bf
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ce413d83f2e67e5c5b2219b6865e6ddd81dea95bc3f1141dc53e6be5b01bbaae
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34014F75E00719BBEB109FA59C49A5EBFB8FB59751F044065FA04A7281D6709C04DBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00511BF4
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00511BFC
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00511C07
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00511C12
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00511C1A
                                                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00511C22
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Virtual
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4278518827-0
                                                                                                                                                                                                                                  • Opcode ID: b6fc38aaa8901985c9f2a787d21690b57a47ac0ad622e25252784ae949c0b537
                                                                                                                                                                                                                                  • Instruction ID: 8104bd8a3a16777a0100d31c6e56535fe1fec174e2b76d9ba146ccab654f1ad9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b6fc38aaa8901985c9f2a787d21690b57a47ac0ad622e25252784ae949c0b537
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 56016CB09027597DE3008F5A8C85B52FFE8FF19354F04411B915C4B941C7F5A864CBE5
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0057EB30
                                                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0057EB46
                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 0057EB55
                                                                                                                                                                                                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0057EB64
                                                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0057EB6E
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0057EB75
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 839392675-0
                                                                                                                                                                                                                                  • Opcode ID: cb8b2c5986061f3ecbe7529d368d2e85f1512affa14f6e349cd04dc55f1f8ae4
                                                                                                                                                                                                                                  • Instruction ID: fc39b818e2df40502db5299f8939906dcd16140d734222746a9f8807cb6daf27
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cb8b2c5986061f3ecbe7529d368d2e85f1512affa14f6e349cd04dc55f1f8ae4
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E4F05E72240158BFE7219B669C0EEEF3E7CEFDBB11F004159F601D6091EBA05A05E6B5
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetClientRect.USER32(?), ref: 00567452
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 00567469
                                                                                                                                                                                                                                  • GetWindowDC.USER32(?), ref: 00567475
                                                                                                                                                                                                                                  • GetPixel.GDI32(00000000,?,?), ref: 00567484
                                                                                                                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00567496
                                                                                                                                                                                                                                  • GetSysColor.USER32(00000005), ref: 005674B0
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 272304278-0
                                                                                                                                                                                                                                  • Opcode ID: 2ded65c8e3c2f113880d184c2ae073f1e8081e6a7966a9bfc89ba16d13495d4a
                                                                                                                                                                                                                                  • Instruction ID: d1812f9935a0adfe8a119fd6e5cfcef09dae11d2db8d67be07d1dd61e9215de1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2ded65c8e3c2f113880d184c2ae073f1e8081e6a7966a9bfc89ba16d13495d4a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 71018B31400219EFDB109F64DD08BAA7FB5FF19312F1004A0FA16A31A0CF311E45EB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0057187F
                                                                                                                                                                                                                                  • UnloadUserProfile.USERENV(?,?), ref: 0057188B
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00571894
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 0057189C
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 005718A5
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 005718AC
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 146765662-0
                                                                                                                                                                                                                                  • Opcode ID: 7b1f133492d5ece76174093fd546ca3583e09e08d24f743fd9ffd3a0e52d2b78
                                                                                                                                                                                                                                  • Instruction ID: 53388d2a26a516a9766c5c590047ea269dd84adecef78addd8aa7507263693c6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b1f133492d5ece76174093fd546ca3583e09e08d24f743fd9ffd3a0e52d2b78
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 63E0E536204101BBDB015FA1ED0C90ABF79FF6AB22B108625F22581070CB329425EF50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 0051BEB3
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Init_thread_footer
                                                                                                                                                                                                                                  • String ID: D%^$D%^$D%^$D%^D%^
                                                                                                                                                                                                                                  • API String ID: 1385522511-1929028606
                                                                                                                                                                                                                                  • Opcode ID: ee0637ec5ae8d1e99c32a99323fdec80142ee181e792a72d4f7fcefe397a9730
                                                                                                                                                                                                                                  • Instruction ID: 6f991f027e25756a3003fd0b7dcf529f9e945aea5314bd44430ac6a76bf9f4a1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ee0637ec5ae8d1e99c32a99323fdec80142ee181e792a72d4f7fcefe397a9730
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: D6913875A0020ACFEB18CF59C0906EABBF1FF58314F24856AD985AB351E731AD81DBD0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00530242: EnterCriticalSection.KERNEL32(005E070C,005E1884,?,?,0052198B,005E2518,?,?,?,005112F9,00000000), ref: 0053024D
                                                                                                                                                                                                                                    • Part of subcall function 00530242: LeaveCriticalSection.KERNEL32(005E070C,?,0052198B,005E2518,?,?,?,005112F9,00000000), ref: 0053028A
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 005300A3: __onexit.LIBCMT ref: 005300A9
                                                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 00597BFB
                                                                                                                                                                                                                                    • Part of subcall function 005301F8: EnterCriticalSection.KERNEL32(005E070C,?,?,00528747,005E2514), ref: 00530202
                                                                                                                                                                                                                                    • Part of subcall function 005301F8: LeaveCriticalSection.KERNEL32(005E070C,?,00528747,005E2514), ref: 00530235
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                                  • String ID: +TV$5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                                  • API String ID: 535116098-200929741
                                                                                                                                                                                                                                  • Opcode ID: dd743e6b6e7f38b893b0408a6e180171b09f691def82274124626138dbd991bb
                                                                                                                                                                                                                                  • Instruction ID: 5f0fb7d791387c32185073a1c367636e123ab176c65c60e18ac2b4aa22c28088
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: dd743e6b6e7f38b893b0408a6e180171b09f691def82274124626138dbd991bb
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8A919D74A1420AEFCF04EF54D8959ADBFB5FF89300F14845AF8469B292DB71AE81CB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0057C6EE
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0057C735
                                                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0057C79C
                                                                                                                                                                                                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0057C7CA
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                  • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                  • Opcode ID: 1fd072547dfd703c48e03b3ceb279b8f33465d885e4f2eec45220a6a42710356
                                                                                                                                                                                                                                  • Instruction ID: a3dda11ab15fac253c6db574705e2fd073e956b4adf7794585aac684035722c4
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1fd072547dfd703c48e03b3ceb279b8f33465d885e4f2eec45220a6a42710356
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9C51DF716043019BD7199F28E889B6B7FE8FF89310F048A2DF999D31D1DB70D944AB52
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 0059AEA3
                                                                                                                                                                                                                                    • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                                                                                                                                                                                                  • GetProcessId.KERNEL32(00000000), ref: 0059AF38
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0059AF67
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                  • String ID: <$@
                                                                                                                                                                                                                                  • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                  • Opcode ID: df3c24d522953f29ada620cc846509c2e90526cc4d425526d93c8ec66ad93cb9
                                                                                                                                                                                                                                  • Instruction ID: 90671fb062b8a2f915692e78eef52098666e0e30d31774189c009a972bd22642
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: df3c24d522953f29ada620cc846509c2e90526cc4d425526d93c8ec66ad93cb9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 55715574A0021A9FDF14DF54C488A9EBBF5FF48300F048499E816AB392DB31ED85CBA1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00577206
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0057723C
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0057724D
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 005772CF
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                  • String ID: DllGetClassObject
                                                                                                                                                                                                                                  • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                  • Opcode ID: 80f6784be5d728d7666e60af358c3003d011ee086498d1c3f4699d5c60d96ee3
                                                                                                                                                                                                                                  • Instruction ID: da2a720d7b9e695153c1b04487fd3d582e97116edaf2c8853fbfc902e3e55f44
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 80f6784be5d728d7666e60af358c3003d011ee086498d1c3f4699d5c60d96ee3
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BE417F75604208EFDB15CF54E884A9A7FB9FF49310F14C4A9BD199F20AD7B0DA44EBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005A3E35
                                                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 005A3E4A
                                                                                                                                                                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 005A3E92
                                                                                                                                                                                                                                  • DrawMenuBar.USER32 ref: 005A3EA5
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                  • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                  • Opcode ID: 1bceec80553098125193177f9fca3ba96c71b585e905496f9ab3174f2a8371fb
                                                                                                                                                                                                                                  • Instruction ID: 6be0cb3900492b489e7d8b38080c9504939d65d214191f6a9dae164730f321f5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1bceec80553098125193177f9fca3ba96c71b585e905496f9ab3174f2a8371fb
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C3413875A01209EFDB10DF50E884AEEBBB9FF4A359F04412AF905AB250D730AE54DF50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00571E66
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00571E79
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00571EA9
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                  • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                  • Opcode ID: f287664d431fd0abb18ec9700a7f7a8d701f0ba397c8fb942309107aacc1d798
                                                                                                                                                                                                                                  • Instruction ID: 892e5f3c202c9373ec246605e7e8a0d623a05e3ad30fdf0578eba26b9ef320ff
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f287664d431fd0abb18ec9700a7f7a8d701f0ba397c8fb942309107aacc1d798
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 42210A71900105BAEB149B68EC5ACFF7FBCFF86390B108529FC59A72D1DB344D49A660
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                                                  • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                                                                                                                                                                                  • API String ID: 176396367-4004644295
                                                                                                                                                                                                                                  • Opcode ID: 2cade854eb4908f9b374b67b62f35ba981a09a99db2bb01d5779fb6f223a36b7
                                                                                                                                                                                                                                  • Instruction ID: 522803fa16ebc2750780e43fed22bc03c45084630453367975b6cd4281c06cd4
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2cade854eb4908f9b374b67b62f35ba981a09a99db2bb01d5779fb6f223a36b7
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0831F873A0056E4BCF30DF2C99501BE3F91BBA5790F55402AE855AB345F671CE84D7A0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 005A2F8D
                                                                                                                                                                                                                                  • LoadLibraryW.KERNEL32(?), ref: 005A2F94
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 005A2FA9
                                                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 005A2FB1
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                  • String ID: SysAnimate32
                                                                                                                                                                                                                                  • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                  • Opcode ID: 03ab5e489a4027317a90e1f0d6a2ae0bb6f6a0279b32785d7187ffa461151d4c
                                                                                                                                                                                                                                  • Instruction ID: 96ab904e3b7256b38d47e8eba9819b34847afc57450e7fba80572e2985b0c4f6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 03ab5e489a4027317a90e1f0d6a2ae0bb6f6a0279b32785d7187ffa461151d4c
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CF219A71204209AFEB108F68DC87EBF3BB9FB5A364F104619FA50D6190D771DC91AB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00534D1E,005428E9,?,00534CBE,005428E9,005D88B8,0000000C,00534E15,005428E9,00000002), ref: 00534D8D
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00534DA0
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,00534D1E,005428E9,?,00534CBE,005428E9,005D88B8,0000000C,00534E15,005428E9,00000002,00000000), ref: 00534DC3
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                  • Opcode ID: 974339bd7cf61aa76d78f159d82908e21f210110e3a7a5bedf94b514405cbfd3
                                                                                                                                                                                                                                  • Instruction ID: 692752c2c850a5c8ed03e6f098b84b58c0440c771ae0dc7cf6b7e5924add74c1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 974339bd7cf61aa76d78f159d82908e21f210110e3a7a5bedf94b514405cbfd3
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CDF03C34A40209ABDB119B94DC49BAEBFE5FB54751F0001A5E806A62A0CB70A944DE90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00514EDD,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E9C
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00514EAE
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00514EDD,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514EC0
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                  • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                  • Opcode ID: 5d36be5614eb4e6998002b964ab54e41cd091c887bffed96b6f490ff2449181c
                                                                                                                                                                                                                                  • Instruction ID: 16283ffd9647496279248e6936e60fcdeb8308ace92cc0f5365f1196ffeef1e6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5d36be5614eb4e6998002b964ab54e41cd091c887bffed96b6f490ff2449181c
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 54E08635B016225BE33117257C18B9F7E58BF93B627050215FC04D2200DB60CD4598A2
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00553CDE,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E62
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00514E74
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00553CDE,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E87
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                  • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                  • Opcode ID: 8b0b7506932a8cdee092e827fff0d333b0eeb814c379298c8e358e1370f63e03
                                                                                                                                                                                                                                  • Instruction ID: c00cc8ec08d002cd9b4a5957fddf67c7e2e60ced3bcc97b4d2ec27bf5b7f19f1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8b0b7506932a8cdee092e827fff0d333b0eeb814c379298c8e358e1370f63e03
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 17D0123560262257A7321B257C18DCF7E1CBF87B513050715F905A6214DF61CD46D9E1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00582C05
                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?), ref: 00582C87
                                                                                                                                                                                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00582C9D
                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00582CAE
                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00582CC0
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: File$Delete$Copy
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3226157194-0
                                                                                                                                                                                                                                  • Opcode ID: c9265f0dc7b09e6f7b65cdb07604ec9e22f9c21fcc421de5ee2fbd8f50c0f2ff
                                                                                                                                                                                                                                  • Instruction ID: d8a466fde6715d192c1b25391eab9c62b1a2b36353e92d2b34031b6139532f0e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c9265f0dc7b09e6f7b65cdb07604ec9e22f9c21fcc421de5ee2fbd8f50c0f2ff
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 99B1417190111AABDF15EBA4CC89EEE7FBDFF89350F1040A6F909F6141EA319A448F61
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 0059A427
                                                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0059A435
                                                                                                                                                                                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0059A468
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 0059A63D
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3488606520-0
                                                                                                                                                                                                                                  • Opcode ID: 03b6ca2fe12878da1c5c8d003b41012fd0046db1cd9d635ff7dcb1b093906e26
                                                                                                                                                                                                                                  • Instruction ID: a1d191c2bac256b3c28d0f258f2a557af3329cf0ad95e8c8a8494c0d65edd18f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 03b6ca2fe12878da1c5c8d003b41012fd0046db1cd9d635ff7dcb1b093906e26
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BCA160716043019FEB20DF24D88AB2ABBE5BF84714F14885DF55A9B3D2DB71EC418B92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0057DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0057CF22,?), ref: 0057DDFD
                                                                                                                                                                                                                                    • Part of subcall function 0057DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0057CF22,?), ref: 0057DE16
                                                                                                                                                                                                                                    • Part of subcall function 0057E199: GetFileAttributesW.KERNEL32(?,0057CF95), ref: 0057E19A
                                                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 0057E473
                                                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0057E4AC
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0057E5EB
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0057E603
                                                                                                                                                                                                                                  • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0057E650
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3183298772-0
                                                                                                                                                                                                                                  • Opcode ID: 1ca2ea8168c41e3a96d73ee7f9078b7d37f065beb2141432717f693e3f3fbaa5
                                                                                                                                                                                                                                  • Instruction ID: f7b32ffa0406c7e72e17dbb538541a1960531860fa7a35bfe44debbd196d8cad
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1ca2ea8168c41e3a96d73ee7f9078b7d37f065beb2141432717f693e3f3fbaa5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 125192B24083455BC724DB90E8969DF7BECBFC8340F00492EF689D3151EF75A6889766
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059B6AE,?,?), ref: 0059C9B5
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059C9F1
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA68
                                                                                                                                                                                                                                    • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA9E
                                                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059BAA5
                                                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0059BB00
                                                                                                                                                                                                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0059BB63
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?), ref: 0059BBA6
                                                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0059BBB3
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 826366716-0
                                                                                                                                                                                                                                  • Opcode ID: ab358ccb64121e4d00b320407a521ea787e4b4bf072dc6102dfda4396054a205
                                                                                                                                                                                                                                  • Instruction ID: cdc935dd82569dc0e844e059fad9d4eec726ddd56382caa8f3be6678c7951da6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ab358ccb64121e4d00b320407a521ea787e4b4bf072dc6102dfda4396054a205
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8661B031208241AFE714DF24C594E6ABFE5FF84308F14895CF49A8B2A2DB31ED45CB92
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00578BCD
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32 ref: 00578C3E
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32 ref: 00578C9D
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00578D10
                                                                                                                                                                                                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00578D3B
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4136290138-0
                                                                                                                                                                                                                                  • Opcode ID: 281ad127c6f5b488f41dd9095753c0cfa24943926c3d3f92b3153a99f55794ce
                                                                                                                                                                                                                                  • Instruction ID: 7c80970e1213464221eb4496de8c75ebeb80294f245bfc2cd8b3f89fe0b275e7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 281ad127c6f5b488f41dd9095753c0cfa24943926c3d3f92b3153a99f55794ce
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 415159B5A00219EFCB14CF68D894AAABBF8FF8D310B158559E909DB350E730E911CF90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00588BAE
                                                                                                                                                                                                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00588BDA
                                                                                                                                                                                                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00588C32
                                                                                                                                                                                                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00588C57
                                                                                                                                                                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00588C5F
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2832842796-0
                                                                                                                                                                                                                                  • Opcode ID: bc5073d9dcf1f591bae4ac1b0e64fad05ea0508653aa4614ab250d7019c84637
                                                                                                                                                                                                                                  • Instruction ID: a19e350f6f286658c5e9b15f55307042e586999b4f5f3ad6ce430dbebeefcec4
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bc5073d9dcf1f591bae4ac1b0e64fad05ea0508653aa4614ab250d7019c84637
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3D514C35A002199FDB05EF64C885AA9BFF5FF89314F098458E849AB362DB31ED51CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00598F40
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00598FD0
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00598FEC
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00599032
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00599052
                                                                                                                                                                                                                                    • Part of subcall function 0052F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00581043,?,753CE610), ref: 0052F6E6
                                                                                                                                                                                                                                    • Part of subcall function 0052F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0056FA64,00000000,00000000,?,?,00581043,?,753CE610,?,0056FA64), ref: 0052F70D
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 666041331-0
                                                                                                                                                                                                                                  • Opcode ID: 30bd0609d7893bdcba96d7795368c2ecc48da038254d8f637e30759a0fe88f98
                                                                                                                                                                                                                                  • Instruction ID: fbbef9e352b1613c8fa91f9117b92fae8a2c555a3f6b240144b2c7ccdc133f01
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 30bd0609d7893bdcba96d7795368c2ecc48da038254d8f637e30759a0fe88f98
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F9511735600205DFDB11DF58C4988A9BFF1FF8A314F0980A8E81A9B362DB31ED85CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(00000002,000000F0,?), ref: 005A6C33
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,?), ref: 005A6C4A
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 005A6C73
                                                                                                                                                                                                                                  • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0058AB79,00000000,00000000), ref: 005A6C98
                                                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 005A6CC7
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3688381893-0
                                                                                                                                                                                                                                  • Opcode ID: 0e697621d9952cc67840213a7c0c9299afe9c12277914fe7d495b2076fc54496
                                                                                                                                                                                                                                  • Instruction ID: 3b39315b6169eefebab93b79cc03f7a843ee7e4f72620e3c0e304cce5329afcd
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0e697621d9952cc67840213a7c0c9299afe9c12277914fe7d495b2076fc54496
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CF418035A04104AFD724DF28CC68BAD7FA5FB0B360F190268F995AB2A1C771AD41DA50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 269201875-0
                                                                                                                                                                                                                                  • Opcode ID: 2ec36bdd1afe50e5cc68242e394cdd225a0ad034113f912f2255c69403aa58d5
                                                                                                                                                                                                                                  • Instruction ID: 183b748e96f74ac567f286ee50b1371f51938626959f1d6d97846b07228f91e5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2ec36bdd1afe50e5cc68242e394cdd225a0ad034113f912f2255c69403aa58d5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5E41E432A002109FCB24DF78C884A9EBBF5FF89318F554569F515EB396D631AD01DB80
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00529141
                                                                                                                                                                                                                                  • ScreenToClient.USER32(00000000,?), ref: 0052915E
                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000001), ref: 00529183
                                                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000002), ref: 0052919D
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4210589936-0
                                                                                                                                                                                                                                  • Opcode ID: 9265c970efff0707028236a189c98b5f60c89f4a6111d25c2623092567dad064
                                                                                                                                                                                                                                  • Instruction ID: 9d2a1fbd3cd9d4703fec7a0be231ebe00589e17911c06a0eb440ed85d9f8d19a
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9265c970efff0707028236a189c98b5f60c89f4a6111d25c2623092567dad064
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1D415F7190861BBBDF159F69D848BEEBB74FF4A324F20421AE425A32D0C7305D54DB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetInputState.USER32 ref: 005838CB
                                                                                                                                                                                                                                  • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00583922
                                                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 0058394B
                                                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 00583955
                                                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00583966
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2256411358-0
                                                                                                                                                                                                                                  • Opcode ID: 4503aef7a4387d5955e546e11e77a2924c56c79e8e0bc290dd450717327f6e5b
                                                                                                                                                                                                                                  • Instruction ID: 4f7c704a049fd1d16365d79e5dc282e96174174b464351dbbf9ba9575ee632fa
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4503aef7a4387d5955e546e11e77a2924c56c79e8e0bc290dd450717327f6e5b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5931EB709057819EEB39EF34D849BB63FA8FB15700F04056DECA6E60A0E7F49689DB11
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0058C21E,00000000), ref: 0058CF38
                                                                                                                                                                                                                                  • InternetReadFile.WININET(?,00000000,?,?), ref: 0058CF6F
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000,?,?,?,0058C21E,00000000), ref: 0058CFB4
                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,0058C21E,00000000), ref: 0058CFC8
                                                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,0058C21E,00000000), ref: 0058CFF2
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3191363074-0
                                                                                                                                                                                                                                  • Opcode ID: 8734661e5c085aaa1932168fdee93733a9fceec672983265a51ab994de73f67a
                                                                                                                                                                                                                                  • Instruction ID: 8ef22b1384aa3925981837eb9b4bbcd1e2dfa31eb94be813000d1238b4842efa
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8734661e5c085aaa1932168fdee93733a9fceec672983265a51ab994de73f67a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 55314C71604205AFEB20EFA5D884AABBFF9FF15354B10442EFA06E2141DB30AE44DB70
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00571915
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000001,00000201,00000001), ref: 005719C1
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?), ref: 005719C9
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000001,00000202,00000000), ref: 005719DA
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?), ref: 005719E2
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3382505437-0
                                                                                                                                                                                                                                  • Opcode ID: 4690d1f04d452f7130f5e8eda3d6dce698ed176c45c72cb382b4a5dfd1410890
                                                                                                                                                                                                                                  • Instruction ID: 3486ec42c9f545e93dc0979e5a5cae22f7656c2c3d0fa965b371baba725cc6ab
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4690d1f04d452f7130f5e8eda3d6dce698ed176c45c72cb382b4a5dfd1410890
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1A31CD71A00219EFCB00CFACD998ADE3FB5FB55314F108229FA25AB2D0C7709945EB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 005A5745
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 005A579D
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A57AF
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A57BA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 005A5816
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 763830540-0
                                                                                                                                                                                                                                  • Opcode ID: 56df450c6b26b099d33aa84421eb53186bcf6070b79e5e17adef38816cd82d0d
                                                                                                                                                                                                                                  • Instruction ID: a4284232c3d5620534d9205d8c27ffa105127e8976dad31e93bdc0d7ede0f324
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 56df450c6b26b099d33aa84421eb53186bcf6070b79e5e17adef38816cd82d0d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: EF219331904618DADB208F64DC84EEE7FB8FF56320F108616F919EB180E7709985CF50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • IsWindow.USER32(00000000), ref: 00590951
                                                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 00590968
                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 005909A4
                                                                                                                                                                                                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 005909B0
                                                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000003), ref: 005909E8
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4156661090-0
                                                                                                                                                                                                                                  • Opcode ID: 04ef9c01de7544c68aa15d2e3ad33063e8de2b277dcde7cc869954cf848ff025
                                                                                                                                                                                                                                  • Instruction ID: 5b628a112ce0d0d5a01c5e1db127711a9e8f6c3e44d1a8b7dd4bb2a884670cdb
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 04ef9c01de7544c68aa15d2e3ad33063e8de2b277dcde7cc869954cf848ff025
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8C218435600204AFEB04EF69C949AAEBFF9FF85700F048468E84AA7352DB30EC44DB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0054CDC6
                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0054CDE9
                                                                                                                                                                                                                                    • Part of subcall function 00543820: RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0054CE0F
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054CE22
                                                                                                                                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0054CE31
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 336800556-0
                                                                                                                                                                                                                                  • Opcode ID: 545b18b6b127e8176ad3c53acd7e9dd6057982efdb3e185bc1f9b7c70cee9ebe
                                                                                                                                                                                                                                  • Instruction ID: ff3b122b98d15f41fd89ee0a481dabfdb451f0f5dca1c607a42411067adcf822
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 545b18b6b127e8176ad3c53acd7e9dd6057982efdb3e185bc1f9b7c70cee9ebe
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3E0184726032157F276216B66C8CDBB7D6DFEC7BA93150129F905C7201EF618D1291B0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00529693
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 005296A2
                                                                                                                                                                                                                                  • BeginPath.GDI32(?), ref: 005296B9
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 005296E2
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3225163088-0
                                                                                                                                                                                                                                  • Opcode ID: 700be6cb469864f891a56b2127dd2869d07d1816ded742b45bc34b87be9aa036
                                                                                                                                                                                                                                  • Instruction ID: 9deb3f3eb4187ff1688620d40598047957678a1737c4e9376a05da9ae058af06
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 700be6cb469864f891a56b2127dd2869d07d1816ded742b45bc34b87be9aa036
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7D21B331901759EBDB118F64EC48BAD3FA4BF22315F100215F450DA2F1D3706889EF98
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _memcmp
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2931989736-0
                                                                                                                                                                                                                                  • Opcode ID: c18d710ded64dc96bc542cf3b5c065ebfa722cd7cb7082d48ba48316ec425213
                                                                                                                                                                                                                                  • Instruction ID: fcb6afef9bf14232aed0a2565e7e3c0099bc22d36e1514db90967f5f2333a981
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c18d710ded64dc96bc542cf3b5c065ebfa722cd7cb7082d48ba48316ec425213
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F001B5A1645A0ABBE20C5521AD86FBF7B5CFB613E4F008420FE0D9A241F7A1ED1093B4
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,?,0053F2DE,00543863,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6), ref: 00542DFD
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542E32
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542E59
                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,00511129), ref: 00542E66
                                                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,00511129), ref: 00542E6F
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorLast$_free
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3170660625-0
                                                                                                                                                                                                                                  • Opcode ID: 222cb225c39adcdd33f4807d537e79d17de2b20d3df9469607ada58ff5019b36
                                                                                                                                                                                                                                  • Instruction ID: 7094b51df13324a460dbb4d6c166e14bc6fde269b9d143d75abd364b87b12f74
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 222cb225c39adcdd33f4807d537e79d17de2b20d3df9469607ada58ff5019b36
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9A01263210562267871263752C49DFB3E6DBBE13ACFA04426F41593192EE708C149020
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?,?,0057035E), ref: 0057002B
                                                                                                                                                                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570046
                                                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570054
                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?), ref: 00570064
                                                                                                                                                                                                                                  • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570070
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3897988419-0
                                                                                                                                                                                                                                  • Opcode ID: 6537f40b0cda1fb16244e354d73a21bc9fd15649829f3c76dd819279baac11ba
                                                                                                                                                                                                                                  • Instruction ID: 693e5b2af9e0729885dc1859e284c5da0ef7a492c6ca17c16235ec61ae867d90
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6537f40b0cda1fb16244e354d73a21bc9fd15649829f3c76dd819279baac11ba
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 46018B72600205FFDB104F69EC08BAA7EEDFB547A2F14A124F909D2250EB75DD44BBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0057E997
                                                                                                                                                                                                                                  • QueryPerformanceFrequency.KERNEL32(?), ref: 0057E9A5
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 0057E9AD
                                                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0057E9B7
                                                                                                                                                                                                                                  • Sleep.KERNEL32 ref: 0057E9F3
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2833360925-0
                                                                                                                                                                                                                                  • Opcode ID: 3293825c91df3bfa04182e8f917a2a17ab8bd7763472831cac6621a360356396
                                                                                                                                                                                                                                  • Instruction ID: 1a027cc55a0d5889e96598723f7ee57a72e8a5a2f720b357d7223f34b26a0757
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3293825c91df3bfa04182e8f917a2a17ab8bd7763472831cac6621a360356396
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 71015B72D01629DBCF009BE4E85AADDBF78BF1E301F004586E606B2241CB309559EB61
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00571114
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571120
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 0057112F
                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571136
                                                                                                                                                                                                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0057114D
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 842720411-0
                                                                                                                                                                                                                                  • Opcode ID: f6a2cf74d7a01e6596447bdf6e8af8dfe1c6b489c74989028028e8569a8ae2f5
                                                                                                                                                                                                                                  • Instruction ID: c6136f9fc9b8287e4255750945e0d6448a2bf261b42c9600f0abccdcd726c832
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: f6a2cf74d7a01e6596447bdf6e8af8dfe1c6b489c74989028028e8569a8ae2f5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 08011975200605BFDB114FA9EC49A6A3F6EFF8A3A0B604419FA45D7360DA31DD04EA60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00570FCA
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00570FD6
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00570FE5
                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00570FEC
                                                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00571002
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 44706859-0
                                                                                                                                                                                                                                  • Opcode ID: c45069ca284d4fd7f6399ac621f8fbb70e8bc9340150943286064622f09ba86d
                                                                                                                                                                                                                                  • Instruction ID: fb6028b963192fc27c0e25af8a7c0bd5262cba8585d98445d484def58dba836d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c45069ca284d4fd7f6399ac621f8fbb70e8bc9340150943286064622f09ba86d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7CF04935200701ABDB214FA9AC4DF5A3FADFF9A762F104415FA49C6251EE70DC54AA60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0057102A
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00571036
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00571045
                                                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0057104C
                                                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00571062
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 44706859-0
                                                                                                                                                                                                                                  • Opcode ID: d5f4b3ebc07cdc12eb6636ac184be9f7786526de063174e18f9b7b78d1e892d5
                                                                                                                                                                                                                                  • Instruction ID: 2fa8470c3eb9a693007dc5b96c8b49590f76c8b5d46856077688edcdbde6c1f6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d5f4b3ebc07cdc12eb6636ac184be9f7786526de063174e18f9b7b78d1e892d5
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9DF04935200701ABDB215FAAEC4DF5A3FADFF9A761F104415FA49C6250DE70D854AA60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 00580324
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 00580331
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 0058033E
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 0058034B
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 00580358
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 00580365
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseHandle
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2962429428-0
                                                                                                                                                                                                                                  • Opcode ID: 7834c3ed929462e4082d5966cb35c3af576849a463b1935eef56009c7957ac67
                                                                                                                                                                                                                                  • Instruction ID: 63279650871853044fdf335bb996c966c14b476cf46726462eed549cd631cf13
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7834c3ed929462e4082d5966cb35c3af576849a463b1935eef56009c7957ac67
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 10019C72801B159FCB30AF66D880816FBF9BE602163159E3FD19662971CBB1A958DF80
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D752
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D764
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D776
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D788
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054D79A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                                                  • Opcode ID: ff0cb793a7fc2f9fd9ab885646695bfb0b7c8c4a8d3cc97eb3346557edd25968
                                                                                                                                                                                                                                  • Instruction ID: 13e23af86243c5d14f9ed30e9a6b8df4a749c514032d72bdaff7f8b76eb33a5f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ff0cb793a7fc2f9fd9ab885646695bfb0b7c8c4a8d3cc97eb3346557edd25968
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 46F04F32541216AB8621EB65F9C5D967FFDFB44318BD40806F049D7502C734FC809670
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00575C58
                                                                                                                                                                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00575C6F
                                                                                                                                                                                                                                  • MessageBeep.USER32(00000000), ref: 00575C87
                                                                                                                                                                                                                                  • KillTimer.USER32(?,0000040A), ref: 00575CA3
                                                                                                                                                                                                                                  • EndDialog.USER32(?,00000001), ref: 00575CBD
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3741023627-0
                                                                                                                                                                                                                                  • Opcode ID: ac88b2363bdaaa7499b7834fec45fe70df19d3109fe8213ee3b6bd6814aee176
                                                                                                                                                                                                                                  • Instruction ID: fb1d42a86d788f89ca4a9de9a2f5bc9cf14a09e9d727cd8c61a7b81790096234
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ac88b2363bdaaa7499b7834fec45fe70df19d3109fe8213ee3b6bd6814aee176
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 88018630500B04ABEB215B14ED4EFA67FFCBB11B05F044559A587A20E1EBF0AD88AA90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 005422BE
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                                                                                                                                                                                                    • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 005422D0
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 005422E3
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 005422F4
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00542305
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                                                  • Opcode ID: c8822d6c37e36ab73ffaa7e415839e841dacf6f40eb7b7a4ef2c2c89ac467505
                                                                                                                                                                                                                                  • Instruction ID: 6e6b9053c052ea30b8df7a7fa076dd89f6a959f781c5bc0cc975154efe4965d6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c8822d6c37e36ab73ffaa7e415839e841dacf6f40eb7b7a4ef2c2c89ac467505
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 66F0B4784015B29B8A26AF56BC8188C3F74F738764F801107F058DA2B1C7710496FFE8
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 005295D4
                                                                                                                                                                                                                                  • StrokeAndFillPath.GDI32(?,?,005671F7,00000000,?,?,?), ref: 005295F0
                                                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00529603
                                                                                                                                                                                                                                  • DeleteObject.GDI32 ref: 00529616
                                                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 00529631
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2625713937-0
                                                                                                                                                                                                                                  • Opcode ID: 1de2066f372abafc33b299c12c1ac75a756c330819fcff9d7bc5cd86e80e004b
                                                                                                                                                                                                                                  • Instruction ID: 200df3aa9b78b2f16348f5e6e0a2d62ff1a6f020dfa8d45f27de7e33c17c2d95
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1de2066f372abafc33b299c12c1ac75a756c330819fcff9d7bc5cd86e80e004b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 11F04F31105A48EBDB1A5F65ED5C7683FA1BF22322F048214F4A5991F2CB348999FF28
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: __freea$_free
                                                                                                                                                                                                                                  • String ID: a/p$am/pm
                                                                                                                                                                                                                                  • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                  • Opcode ID: 80df0facff56a307b35277d354b267233c5c8cfe930299b035d27d01bf7ca494
                                                                                                                                                                                                                                  • Instruction ID: b3fb87df8b0c21aec00abaf69fc268ed9dd220c54b0c1d378f7e8fd52fd1d0f7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 80df0facff56a307b35277d354b267233c5c8cfe930299b035d27d01bf7ca494
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 40D14835900A06DBCB288F68C859BFEBFB1FF05708F244919E9169B650D3759DC0CB99
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00530242: EnterCriticalSection.KERNEL32(005E070C,005E1884,?,?,0052198B,005E2518,?,?,?,005112F9,00000000), ref: 0053024D
                                                                                                                                                                                                                                    • Part of subcall function 00530242: LeaveCriticalSection.KERNEL32(005E070C,?,0052198B,005E2518,?,?,?,005112F9,00000000), ref: 0053028A
                                                                                                                                                                                                                                    • Part of subcall function 005300A3: __onexit.LIBCMT ref: 005300A9
                                                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 00596238
                                                                                                                                                                                                                                    • Part of subcall function 005301F8: EnterCriticalSection.KERNEL32(005E070C,?,?,00528747,005E2514), ref: 00530202
                                                                                                                                                                                                                                    • Part of subcall function 005301F8: LeaveCriticalSection.KERNEL32(005E070C,?,00528747,005E2514), ref: 00530235
                                                                                                                                                                                                                                    • Part of subcall function 0058359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 005835E4
                                                                                                                                                                                                                                    • Part of subcall function 0058359C: LoadStringW.USER32(005E2390,?,00000FFF,?), ref: 0058360A
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                                                                                                                                                                                  • String ID: x#^$x#^$x#^
                                                                                                                                                                                                                                  • API String ID: 1072379062-3539263148
                                                                                                                                                                                                                                  • Opcode ID: 33e53f83f18dbc02615d90e85618936e7530082f503a82ad7f6f574b5a1e0b17
                                                                                                                                                                                                                                  • Instruction ID: b7042cb355b1f99f464c70204d58ead184cd3a5e64363a337f8234473ba18ccd
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 33e53f83f18dbc02615d90e85618936e7530082f503a82ad7f6f574b5a1e0b17
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 11C17B71A00106AFDF14DF98C895EAEBBB9FF48300F118469F945AB291DB70ED49CB90
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: JOQ
                                                                                                                                                                                                                                  • API String ID: 0-3921798060
                                                                                                                                                                                                                                  • Opcode ID: 406b47cefafd532f179173fe4036eb942f9cb2223270f1b6d72f8732076f18dd
                                                                                                                                                                                                                                  • Instruction ID: 6a2e05dfffb8997bfcb0bbf0ecc67ba69fdb86b8c7cd3d9f2bc7bf9880926ced
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 406b47cefafd532f179173fe4036eb942f9cb2223270f1b6d72f8732076f18dd
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CE51BE75D0060A9BCB259FA4CC89FEEBFB8FF45318F14045AF405A7292E6319D01DB61
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00548B6E
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00548B7A
                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00548B81
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                                                                                                                                                                                  • String ID: .S
                                                                                                                                                                                                                                  • API String ID: 2434981716-1539595904
                                                                                                                                                                                                                                  • Opcode ID: b00082088acc37bbf87162f7e33cde85b6b5a706494779aad554395f90418ada
                                                                                                                                                                                                                                  • Instruction ID: 61160430dc0af42a2c6ce47f131ebf2d9356acf99187ec2df56aaa95f0567b98
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b00082088acc37bbf87162f7e33cde85b6b5a706494779aad554395f90418ada
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 40419D70604045AFCB249F25CC84AFD7FE5FB8631CF2885AAF8958B242DE71CC429790
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0057B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005721D0,?,?,00000034,00000800,?,00000034), ref: 0057B42D
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00572760
                                                                                                                                                                                                                                    • Part of subcall function 0057B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005721FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0057B3F8
                                                                                                                                                                                                                                    • Part of subcall function 0057B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0057B355
                                                                                                                                                                                                                                    • Part of subcall function 0057B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00572194,00000034,?,?,00001004,00000000,00000000), ref: 0057B365
                                                                                                                                                                                                                                    • Part of subcall function 0057B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00572194,00000034,?,?,00001004,00000000,00000000), ref: 0057B37B
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005727CD
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0057281A
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                                                  • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                  • Opcode ID: 064dbbebfd5c402402e3f11513dd621facdad38784f15445ffb929dc226f0c2f
                                                                                                                                                                                                                                  • Instruction ID: b7b3cf812bcab17bab430310755f0f5b6b993fc0ed95593300527fad4b2626ab
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 064dbbebfd5c402402e3f11513dd621facdad38784f15445ffb929dc226f0c2f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9A416D72900219AFDB10DBA4DD45BDEBBB8FF45300F108099FA59B7181DB706E85DBA1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00541769
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 00541834
                                                                                                                                                                                                                                  • _free.LIBCMT ref: 0054183E
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free$FileModuleName
                                                                                                                                                                                                                                  • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                  • API String ID: 2506810119-1957095476
                                                                                                                                                                                                                                  • Opcode ID: c3dabe951961c290b38f4da2b5183c950e0ba6acc4b0ccf358698997783da43a
                                                                                                                                                                                                                                  • Instruction ID: eeee8538d5b81146783530cfec5b4309f3ba51fceb5c8e64b119fbbb5fd5db2b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c3dabe951961c290b38f4da2b5183c950e0ba6acc4b0ccf358698997783da43a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5331BC75A00A58ABDB25DB9A9C84DDEBFFCFB95314F104166F8049B211D6708A80DB98
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0057C306
                                                                                                                                                                                                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 0057C34C
                                                                                                                                                                                                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,005E1990,00DA6368), ref: 0057C395
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                  • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                  • Opcode ID: 03565f18d6f4bf437eb29874ece6787541dfd90247eec257be14d44aeb22ef59
                                                                                                                                                                                                                                  • Instruction ID: 82bc2f369544b9245633c3bd4eff52f0b4197526ff05008ff2d93bf76aac84ee
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 03565f18d6f4bf437eb29874ece6787541dfd90247eec257be14d44aeb22ef59
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A1418E712043029FD720DF25E884B5ABFE4BF85320F14CA1DF9A9972D1D730A904EB62
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,005ACC08,00000000,?,?,?,?), ref: 005A44AA
                                                                                                                                                                                                                                  • GetWindowLongW.USER32 ref: 005A44C7
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005A44D7
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Long
                                                                                                                                                                                                                                  • String ID: SysTreeView32
                                                                                                                                                                                                                                  • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                  • Opcode ID: 7d29528cef674264b84be62b0e111c28e55fdb622321f230796781f3db644e79
                                                                                                                                                                                                                                  • Instruction ID: 4873749e4507687ffc0272da20159f5b84f6073fe35ad84ddef6095fe723cada
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7d29528cef674264b84be62b0e111c28e55fdb622321f230796781f3db644e79
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B9315C31210606AFDF219EB8DC45BEA7FA9FB8A334F204725F975921D0D7B0AC519B50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SysReAllocString.OLEAUT32(?,?), ref: 00576EED
                                                                                                                                                                                                                                  • VariantCopyInd.OLEAUT32(?,?), ref: 00576F08
                                                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00576F12
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Variant$AllocClearCopyString
                                                                                                                                                                                                                                  • String ID: *jW
                                                                                                                                                                                                                                  • API String ID: 2173805711-2693160286
                                                                                                                                                                                                                                  • Opcode ID: e222dacec7af85bcd0789438c73db7ac1fa2fcd13b4296e363e227b78d300cf1
                                                                                                                                                                                                                                  • Instruction ID: 44ee51ad280366b0a565b4ed83e78f19bbb2caa039ebc39a47f9f52f1951dfdd
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e222dacec7af85bcd0789438c73db7ac1fa2fcd13b4296e363e227b78d300cf1
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BB31B371604606DFDB04AF64F8949BD3F76FF85300B104898F9064B2A1D7309D91EBA4
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0059335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00593077,?,?), ref: 00593378
                                                                                                                                                                                                                                  • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0059307A
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0059309B
                                                                                                                                                                                                                                  • htons.WSOCK32(00000000,?,?,00000000), ref: 00593106
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                  • String ID: 255.255.255.255
                                                                                                                                                                                                                                  • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                  • Opcode ID: 78dd40aee28c6856205b5010857949670ddff2b7c8a1631a27753eb08665188b
                                                                                                                                                                                                                                  • Instruction ID: b7988a32a94d354688cc7802369c09e2f709e1e9885909f3bd948fcabf683d35
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 78dd40aee28c6856205b5010857949670ddff2b7c8a1631a27753eb08665188b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2A31B039600202DFCB20CF68C589AAA7FE0FF55318F248459E9158B3A2DB32EE45D760
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 005A3F40
                                                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 005A3F54
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 005A3F78
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$Window
                                                                                                                                                                                                                                  • String ID: SysMonthCal32
                                                                                                                                                                                                                                  • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                  • Opcode ID: 2db68bca5e85e011ed30beace7a4883aba6c94eb163cba0bbcd0c4bf80321056
                                                                                                                                                                                                                                  • Instruction ID: e7ee3663323e87410043af921f0bd097f3c6a28c7a2e337e57ddaf431d6ceaab
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2db68bca5e85e011ed30beace7a4883aba6c94eb163cba0bbcd0c4bf80321056
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A821AD32610219BFDF218E54CC46FEE3F79FB89718F110215FA156B190D6B5A894DB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 005A4705
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 005A4713
                                                                                                                                                                                                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 005A471A
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                  • String ID: msctls_updown32
                                                                                                                                                                                                                                  • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                  • Opcode ID: b97b30fca7c9fa717f541dffe9d8cca0d32186fd61603e6af52a40dd884655f9
                                                                                                                                                                                                                                  • Instruction ID: c91d114d8811ffbe7e007e7097770fd6d48f963bac30f61831a6da48671c38db
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b97b30fca7c9fa717f541dffe9d8cca0d32186fd61603e6af52a40dd884655f9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E72151B5600249AFDB10DF68DCC5DBB3BADFB9B394B040459FA019B261DB70EC51DA60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                                  • API String ID: 176396367-2734436370
                                                                                                                                                                                                                                  • Opcode ID: 3e55d52ba33bbedbd9d4ca7f71ee8d94e6a06e8ccc80092ef12fc9aaf2b1f241
                                                                                                                                                                                                                                  • Instruction ID: cd10c6d01f152332f5155d5cf581eff24f34541b12618ff2b35ce0a908ff0897
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3e55d52ba33bbedbd9d4ca7f71ee8d94e6a06e8ccc80092ef12fc9aaf2b1f241
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9921087210462266D331AA29AC06FBB7FACBFD5310F148426F94D97181EB51AD81E3F5
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 005A3840
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 005A3850
                                                                                                                                                                                                                                  • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 005A3876
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                  • String ID: Listbox
                                                                                                                                                                                                                                  • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                  • Opcode ID: ac3c9b42013912ca22de0ad213a1a1cf7f631d677117bae5d8fa9a5fb8b1e451
                                                                                                                                                                                                                                  • Instruction ID: 16ab0d73d7ec5fdddcefd8e1ad1e02aa67a76108507ea7a7b151b4ba6b84a5f6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ac3c9b42013912ca22de0ad213a1a1cf7f631d677117bae5d8fa9a5fb8b1e451
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3521BE72600219BBEB218F64CC85EBF3B6EFF8A754F108125F9009B190CA75DD528BA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00584A08
                                                                                                                                                                                                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00584A5C
                                                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,005ACC08), ref: 00584AD0
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                  • String ID: %lu
                                                                                                                                                                                                                                  • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                  • Opcode ID: 68cff9678ffcb0c9caef91b0f2b0e22263f4b529ac0c212f710bf53590214787
                                                                                                                                                                                                                                  • Instruction ID: 0037eeb0ff125ed1899e4654c4d0db9e6e06dd6a80b791260e61ed13296bf692
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 68cff9678ffcb0c9caef91b0f2b0e22263f4b529ac0c212f710bf53590214787
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C7314B75A00209AFDB10DF54C885EAA7FF9FF49308F1480A5E909EB252DB71EE45CB61
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 005A424F
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 005A4264
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 005A4271
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                                                  • String ID: msctls_trackbar32
                                                                                                                                                                                                                                  • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                  • Opcode ID: 8d912a7132a55813900e5a631ffeac11ee593ad80096fec63b8d9d7627b5ce59
                                                                                                                                                                                                                                  • Instruction ID: 641ec9e6f322ed538e558a8222291f584a4bb7f2c0851ce90431f072bffea93b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8d912a7132a55813900e5a631ffeac11ee593ad80096fec63b8d9d7627b5ce59
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8011A331240248BEEF205E69CC46FAB3FACFFD6B54F110525FA55E6090D6B1DC519B50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                    • Part of subcall function 00572DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00572DC5
                                                                                                                                                                                                                                    • Part of subcall function 00572DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00572DD6
                                                                                                                                                                                                                                    • Part of subcall function 00572DA7: GetCurrentThreadId.KERNEL32 ref: 00572DDD
                                                                                                                                                                                                                                    • Part of subcall function 00572DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00572DE4
                                                                                                                                                                                                                                  • GetFocus.USER32 ref: 00572F78
                                                                                                                                                                                                                                    • Part of subcall function 00572DEE: GetParent.USER32(00000000), ref: 00572DF9
                                                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00572FC3
                                                                                                                                                                                                                                  • EnumChildWindows.USER32(?,0057303B), ref: 00572FEB
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                  • String ID: %s%d
                                                                                                                                                                                                                                  • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                  • Opcode ID: 7e13d4eee0aeb51ca3cd6c13c07e89be3ce19a6521083f4445ffc6e30d7a030b
                                                                                                                                                                                                                                  • Instruction ID: 0284a40ecf1a234bd9a447240347ce344aa19da3ef18e3bce9d07fb704a45c16
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7e13d4eee0aeb51ca3cd6c13c07e89be3ce19a6521083f4445ffc6e30d7a030b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9D11A2716002066BDF14BF74AC89EED3F6ABFD5314F048075B90D9B292DE30994AAB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005A58C1
                                                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005A58EE
                                                                                                                                                                                                                                  • DrawMenuBar.USER32(?), ref: 005A58FD
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                                                  • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                  • Opcode ID: 6bcd8ea499c392a5edc5726ee8ca194be9d52e9e116e645ad74ebc1620751f33
                                                                                                                                                                                                                                  • Instruction ID: c7d871573c25bb420818d4a14f52760362fc881f762fb8be5d11e86f48b69884
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6bcd8ea499c392a5edc5726ee8ca194be9d52e9e116e645ad74ebc1620751f33
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FD010C31500219EEDB619F11E844FAFBFB8BF46361F1484A9F849DA151EB308A94EF21
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0056D3BF
                                                                                                                                                                                                                                  • FreeLibrary.KERNEL32 ref: 0056D3E5
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                                                  • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                                  • API String ID: 3013587201-2590602151
                                                                                                                                                                                                                                  • Opcode ID: e9d0d174f390c45b71d9cd920f70244f378d3083ec3cd8479706207018db8902
                                                                                                                                                                                                                                  • Instruction ID: 0b90b13ec85af04db34f9c90fd8d29fe54aa680639c52263857bdf243e7d459b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e9d0d174f390c45b71d9cd920f70244f378d3083ec3cd8479706207018db8902
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CDF055B5F05A208BC77102115C2896D3FB0BF12701BA88D26E802EB244EB20CC44C2B2
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: e8578f3d0aac6b0e00a43cb10c0aa0e71d98254ee7c952f1ab8b223c4d1836df
                                                                                                                                                                                                                                  • Instruction ID: a66f30f55023ea489b0ddf1a63732a3597511ff16080eb6116a363c08c1efad8
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e8578f3d0aac6b0e00a43cb10c0aa0e71d98254ee7c952f1ab8b223c4d1836df
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 29C16D75A00216EFCB14CF94D898AAEBBF5FF48314F209598E509EB291D731DD41EB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1998397398-0
                                                                                                                                                                                                                                  • Opcode ID: 60f024b417318b33880e3f4025eafc44358c8a7a8db3dd3ca70887c17f494415
                                                                                                                                                                                                                                  • Instruction ID: 668b0a821a1b4d8ff13a3f0aec4b6cc11244cac9605a81a188f9f9832a3beae0
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 60f024b417318b33880e3f4025eafc44358c8a7a8db3dd3ca70887c17f494415
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DFA14975204201DFDB10DF28C489A6ABBE5FF8D714F058859F98A9B362DB30EE45CB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,005AFC08,?), ref: 005705F0
                                                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,005AFC08,?), ref: 00570608
                                                                                                                                                                                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,005ACC40,000000FF,?,00000000,00000800,00000000,?,005AFC08,?), ref: 0057062D
                                                                                                                                                                                                                                  • _memcmp.LIBVCRUNTIME ref: 0057064E
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 314563124-0
                                                                                                                                                                                                                                  • Opcode ID: cad1f59382c62924ea53cf19128c96f0ab7c43fe6dfb078b7315cadeade281ed
                                                                                                                                                                                                                                  • Instruction ID: 853643bb8abe0d859517d7a55ba91d36adbb0d36eb3dce13e5160036971bdeca
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cad1f59382c62924ea53cf19128c96f0ab7c43fe6dfb078b7315cadeade281ed
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 27811C71A00109EFCB04DF94C988DEEBBF9FF89315F108558E506AB290DB71AE06DB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0059A6AC
                                                                                                                                                                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0059A6BA
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0059A79C
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0059A7AB
                                                                                                                                                                                                                                    • Part of subcall function 0052CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00553303,?), ref: 0052CE8A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1991900642-0
                                                                                                                                                                                                                                  • Opcode ID: 8d242395d2a56be87e52751e2e6e6f82af076cf84bb89c48c452d67cbdaab91b
                                                                                                                                                                                                                                  • Instruction ID: 0f7578123f3f8661b9f3d33fd859809fff861ad850c5157a9e63722a22c109ae
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8d242395d2a56be87e52751e2e6e6f82af076cf84bb89c48c452d67cbdaab91b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8E512B71508311AFD710EF24D88AAABBBE8FFC9754F00491DF59597291EB30E944CBA2
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _free
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 269201875-0
                                                                                                                                                                                                                                  • Opcode ID: df1e7caa6d202a2e146bf385ad30c169bc3e72c771be97b682aa503b4c66b550
                                                                                                                                                                                                                                  • Instruction ID: 45c1923008adaf492b3dc735f0795fb6801f190f85a5fd9c959c5b60691cc93d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: df1e7caa6d202a2e146bf385ad30c169bc3e72c771be97b682aa503b4c66b550
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1B416935A00902EBDF216BB98C5ABAF3FA4FF81371F140627FC19C6192F67448495765
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 005A62E2
                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 005A6315
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 005A6382
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3880355969-0
                                                                                                                                                                                                                                  • Opcode ID: 52ec338d578cd0c20444c3495194bd77716a393a8eaf88a09e74580a5eab00b8
                                                                                                                                                                                                                                  • Instruction ID: 1750203f7b1eaf19aaf35c07f46c79752b1c70fb1ba27bb79646e6d86bf0eadb
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 52ec338d578cd0c20444c3495194bd77716a393a8eaf88a09e74580a5eab00b8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2D514A74A00249EFCF14DF68D880AAE7BB5FF96360F14856AF8159B290D730ED81DB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00591AFD
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00591B0B
                                                                                                                                                                                                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00591B8A
                                                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00591B94
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorLast$socket
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1881357543-0
                                                                                                                                                                                                                                  • Opcode ID: d386b4f7722a9fc0b3e674156dc7e61f4f639ac5e84bb701d39eff38a64f1088
                                                                                                                                                                                                                                  • Instruction ID: ed1b5fd3ae5a4b8d786e99ed45286a4aa5f3ed9e37243dcd300ca3a35e9a8f94
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: d386b4f7722a9fc0b3e674156dc7e61f4f639ac5e84bb701d39eff38a64f1088
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2441A1346406126FEB20AF24C88AF657BE6BF85718F548448F5169F3D2D772ED828B90
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 7603d5051b786705936bdacf40334e1075eeceb1d4241edf7a44a93e8efea392
                                                                                                                                                                                                                                  • Instruction ID: f48dd1b68af5ac0b5d65c0a7d208a9d4479702f63bf4235af218ce3b1c1782fe
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7603d5051b786705936bdacf40334e1075eeceb1d4241edf7a44a93e8efea392
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2A41E675A00705AFEB249F38CC46BEABFA9FBC8714F10452AF555DB682D771D9018780
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00585783
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 005857A9
                                                                                                                                                                                                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 005857CE
                                                                                                                                                                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 005857FA
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3321077145-0
                                                                                                                                                                                                                                  • Opcode ID: b56dcd06be71e784add282c570a71e1f1363500182236f832993702df914d5a6
                                                                                                                                                                                                                                  • Instruction ID: 97622cd1184923acccc44fbc011619ff12179e0308cad823a8e074549deb3814
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b56dcd06be71e784add282c570a71e1f1363500182236f832993702df914d5a6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5C410839600611DFDB11EF15C449A5EBFF2BF89320B198488E84AAB362DB30FD41DB91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00536D71,00000000,00000000,005382D9,?,005382D9,?,00000001,00536D71,?,00000001,005382D9,005382D9), ref: 0054D910
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0054D999
                                                                                                                                                                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0054D9AB
                                                                                                                                                                                                                                  • __freea.LIBCMT ref: 0054D9B4
                                                                                                                                                                                                                                    • Part of subcall function 00543820: RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2652629310-0
                                                                                                                                                                                                                                  • Opcode ID: 580bf88760472203997ed1162c675482d3fdf208579fbfb91a578e2191407046
                                                                                                                                                                                                                                  • Instruction ID: dc9ba10fea6b5aaf33a3f7abd3d426312178b81510ae4826cd85b99abcd707ec
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 580bf88760472203997ed1162c675482d3fdf208579fbfb91a578e2191407046
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6E31A872A0020AABDF248F64DC49AEE7FB5FB41354F050169EC04D62A0EB358D54CBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 005A5352
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A5375
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005A5382
                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005A53A8
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3340791633-0
                                                                                                                                                                                                                                  • Opcode ID: 74731ac663ca00aec47cdf147cc1082140f03bd06720b5b4c25fdb16dda904ee
                                                                                                                                                                                                                                  • Instruction ID: 25cbc3b5dc07b2c93bd2823fcccbc58678022017fe9f4e6f55f5a47f6e17b9a6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 74731ac663ca00aec47cdf147cc1082140f03bd06720b5b4c25fdb16dda904ee
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3331C134A55A08EFEF249E14CC45FEC3F65BB96390F984803FA11961E1E7B09940AB41
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 0057ABF1
                                                                                                                                                                                                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 0057AC0D
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 0057AC74
                                                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 0057ACC6
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 432972143-0
                                                                                                                                                                                                                                  • Opcode ID: 70d1605154a81490c527c4639d5994a4193afb5e76bfdd890b407a326cd9d707
                                                                                                                                                                                                                                  • Instruction ID: 48b198dd83313fb857cdd5a0f827b44f9b8d15db2bf5d32bf5664fbce874f750
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 70d1605154a81490c527c4639d5994a4193afb5e76bfdd890b407a326cd9d707
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A631E730A00618BFFF26CB65A809BFE7EA9BBC5310F04C61AF489561D1C3758D85A752
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 005A769A
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 005A7710
                                                                                                                                                                                                                                  • PtInRect.USER32(?,?,005A8B89), ref: 005A7720
                                                                                                                                                                                                                                  • MessageBeep.USER32(00000000), ref: 005A778C
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1352109105-0
                                                                                                                                                                                                                                  • Opcode ID: bca1ddb3d3754f72d57eb063424e8c0488189e73f960527e9d4657b79a9a7384
                                                                                                                                                                                                                                  • Instruction ID: 027ccd4b9684eaa5016031f3e9ebcee76028b9eb94039745946855cd2a3821d0
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: bca1ddb3d3754f72d57eb063424e8c0488189e73f960527e9d4657b79a9a7384
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3E418738A096599FCB01CF58CC94EADBFF4FB9E300F1940A8E854DB261C730A985DB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 005A16EB
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00573A57
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: GetCurrentThreadId.KERNEL32 ref: 00573A5E
                                                                                                                                                                                                                                    • Part of subcall function 00573A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005725B3), ref: 00573A65
                                                                                                                                                                                                                                  • GetCaretPos.USER32(?), ref: 005A16FF
                                                                                                                                                                                                                                  • ClientToScreen.USER32(00000000,?), ref: 005A174C
                                                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 005A1752
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2759813231-0
                                                                                                                                                                                                                                  • Opcode ID: 5391be74a83a66b3b512acd3c74d2ba2f998e340167ace881ce08b96ff4f5cc6
                                                                                                                                                                                                                                  • Instruction ID: 697dcada456007c4ff9dd02e4da64457bfeb40fe9f98f048e87ef06e840727e9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5391be74a83a66b3b512acd3c74d2ba2f998e340167ace881ce08b96ff4f5cc6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 50310C75D00249AFDB04EFA9C8858EEBBF9FF89304B5480A9E415A7211D6319E45CBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0057DFCB
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0057DFE2
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0057E00D
                                                                                                                                                                                                                                  • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0057E018
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3763101759-0
                                                                                                                                                                                                                                  • Opcode ID: 2a01d29b4b3491e51b25cf5115672d96b0942d41372cbf9f50e4f8ed145cd514
                                                                                                                                                                                                                                  • Instruction ID: 977b0fb6d3af7ceae3b1dd00e9f153b75efac3332a998a1588336c4b0868902d
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2a01d29b4b3491e51b25cf5115672d96b0942d41372cbf9f50e4f8ed145cd514
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0421A871900215AFCB119F98E986BAE7FF8FF89750F144065E805BB241D6709D408BA1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 005A9001
                                                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00567711,?,?,?,?,?), ref: 005A9016
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 005A905E
                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00567711,?,?,?), ref: 005A9094
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2864067406-0
                                                                                                                                                                                                                                  • Opcode ID: b27de6c6acbec6156de4e9a1ab71f2b631d74f07c9319cb743fd2d600a2bce84
                                                                                                                                                                                                                                  • Instruction ID: 78e1e6217114ea4b349123317358e3a9b9251f61f825ac4805193c2b6f17d459
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b27de6c6acbec6156de4e9a1ab71f2b631d74f07c9319cb743fd2d600a2bce84
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: FB217F35600128EFDB298F94D898EEE7FB9FF8B390F144055F9058B2A1C7319990EB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?,005ACB68), ref: 0057D2FB
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0057D30A
                                                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0057D319
                                                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,005ACB68), ref: 0057D376
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2267087916-0
                                                                                                                                                                                                                                  • Opcode ID: 76388cb94e18f9081e65437e31167cb6815e4a75b097ef71fbd79a80eea411c8
                                                                                                                                                                                                                                  • Instruction ID: dd30ee54f9184e214da932fee3480280e124b6e1bb3a7ee98d63dbb2bdbe9ca2
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 76388cb94e18f9081e65437e31167cb6815e4a75b097ef71fbd79a80eea411c8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AF2180745042029FC700DF28D8858AA7FF4BE96324F508E1DF499C32A1DB319949DBA3
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00571014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0057102A
                                                                                                                                                                                                                                    • Part of subcall function 00571014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00571036
                                                                                                                                                                                                                                    • Part of subcall function 00571014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00571045
                                                                                                                                                                                                                                    • Part of subcall function 00571014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0057104C
                                                                                                                                                                                                                                    • Part of subcall function 00571014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00571062
                                                                                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 005715BE
                                                                                                                                                                                                                                  • _memcmp.LIBVCRUNTIME ref: 005715E1
                                                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00571617
                                                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 0057161E
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1592001646-0
                                                                                                                                                                                                                                  • Opcode ID: 3debf4159c497cb798911d18c69181ca6e1f79f5b250571d347ac980f4d9a70e
                                                                                                                                                                                                                                  • Instruction ID: d5148ed50c7442a1c90b073f158862b54e62c827c84e81460b17fbc756df0d60
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3debf4159c497cb798911d18c69181ca6e1f79f5b250571d347ac980f4d9a70e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9D219C31E00509AFDF14DFA8D948BEEBBB8FF40344F188459E445AB241E730AA04EB54
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 005A280A
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005A2824
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005A2832
                                                                                                                                                                                                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 005A2840
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2169480361-0
                                                                                                                                                                                                                                  • Opcode ID: 9b93295ffbbfb3882e3d93bc96ff2be45b59afdc10db5d78e62b1e771eebfceb
                                                                                                                                                                                                                                  • Instruction ID: 529f2b07e0fae0fc4c9482cf087dd956be51e61ec344ad3607c5499105e7dddb
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9b93295ffbbfb3882e3d93bc96ff2be45b59afdc10db5d78e62b1e771eebfceb
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AA21A435604512AFE7149B28C846FAA7F95FF86324F148158F4268B6D2CB75FD82CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00578D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0057790A,?,000000FF,?,00578754,00000000,?,0000001C,?,?), ref: 00578D8C
                                                                                                                                                                                                                                    • Part of subcall function 00578D7D: lstrcpyW.KERNEL32(00000000,?,?,0057790A,?,000000FF,?,00578754,00000000,?,0000001C,?,?,00000000), ref: 00578DB2
                                                                                                                                                                                                                                    • Part of subcall function 00578D7D: lstrcmpiW.KERNEL32(00000000,?,0057790A,?,000000FF,?,00578754,00000000,?,0000001C,?,?), ref: 00578DE3
                                                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00578754,00000000,?,0000001C,?,?,00000000), ref: 00577923
                                                                                                                                                                                                                                  • lstrcpyW.KERNEL32(00000000,?,?,00578754,00000000,?,0000001C,?,?,00000000), ref: 00577949
                                                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00578754,00000000,?,0000001C,?,?,00000000), ref: 00577984
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                  • String ID: cdecl
                                                                                                                                                                                                                                  • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                  • Opcode ID: e23b12a75f9845e3deaed9b515920361954fe29019ab30bdba5a485bd0c2166a
                                                                                                                                                                                                                                  • Instruction ID: c69ba510e992c9c8427f7d54099250042fd95d3cfc8c97201ea3779e63ac3bd1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e23b12a75f9845e3deaed9b515920361954fe29019ab30bdba5a485bd0c2166a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E011EC3A201706AFCB155F34F849D7B7BA9FF99350B50802AF946C72A4EF319811E791
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005A7D0B
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000F0,?), ref: 005A7D2A
                                                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 005A7D42
                                                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0058B7AD,00000000), ref: 005A7D6B
                                                                                                                                                                                                                                    • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$Long
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 847901565-0
                                                                                                                                                                                                                                  • Opcode ID: 86bcf2e8cfd4c51e5233cfbd640f5c5ac2670f4a353a542956bdc9cb07b2583f
                                                                                                                                                                                                                                  • Instruction ID: 672f9737c3e61cf425cb86d38485de579685e2f804bc9b47d9c63c41427d65e7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 86bcf2e8cfd4c51e5233cfbd640f5c5ac2670f4a353a542956bdc9cb07b2583f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7611AF32604669AFCB149F28CC04AAA3FA5BF4B360B154724F839DB2F0E7309D55DB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001060,?,00000004), ref: 005A56BB
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A56CD
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005A56D8
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 005A5816
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 455545452-0
                                                                                                                                                                                                                                  • Opcode ID: e992f3e23b6a9c6ffbb7e171d4bece51ceea896cc28284fccf73fd481f471708
                                                                                                                                                                                                                                  • Instruction ID: 4bcfde3f289dc3d914e2ea0f8c620b45377d4e0ceca0dd4ffae8d9c544bfb49c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: e992f3e23b6a9c6ffbb7e171d4bece51ceea896cc28284fccf73fd481f471708
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: F611B1716006099ADF20DF658C85EEE7FACFF56760F104426F915DA081FB709A84CBA0
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                                                  • Opcode ID: 7c945650ae56d52bab73b988a80731a9a6c8ca0631b4f71988971d249b43781f
                                                                                                                                                                                                                                  • Instruction ID: 25ddca58d5f73cbe4e0f60a765f8d1d94f8bdab3b11431305e66d46c9fb772a6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7c945650ae56d52bab73b988a80731a9a6c8ca0631b4f71988971d249b43781f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BF017CF2A05A167EF61116786CC4FA76E2DFF913BCB341325B531511D2DB608C809164
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00571A47
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00571A59
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00571A6F
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00571A8A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                                                                                                                  • Opcode ID: 0e31a196838b77742f68b178ae0ac22c09f554d10720ad6bf42074adf9516f73
                                                                                                                                                                                                                                  • Instruction ID: 0577911197ff0d9eda2f5f1547808625cc7fdeb60b4ac0123afe4dfc1f0706d7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0e31a196838b77742f68b178ae0ac22c09f554d10720ad6bf42074adf9516f73
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5D113C3AD01219FFEB10DBA8CD85FADBB78FB04750F204091E605B7290D6716E50EB94
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0057E1FD
                                                                                                                                                                                                                                  • MessageBoxW.USER32(?,?,?,?), ref: 0057E230
                                                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0057E246
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0057E24D
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2880819207-0
                                                                                                                                                                                                                                  • Opcode ID: 44bb02ebff3f51d0f81813ce3abf94dedf1ecfccc55a93e6e85c111484fe78b0
                                                                                                                                                                                                                                  • Instruction ID: 7a3988581c14abb129092fbf58bd38d92f583a2ca32feb2387fa17234d5a64a6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 44bb02ebff3f51d0f81813ce3abf94dedf1ecfccc55a93e6e85c111484fe78b0
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2F112B76A04354BBC7059FA8EC4AA9F7FADEB5A310F008655F819D7291D670CD0897A0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateThread.KERNEL32(00000000,?,0053CFF9,00000000,00000004,00000000), ref: 0053D218
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0053D224
                                                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 0053D22B
                                                                                                                                                                                                                                  • ResumeThread.KERNEL32(00000000), ref: 0053D249
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 173952441-0
                                                                                                                                                                                                                                  • Opcode ID: 4a4ffae62088c53692ce58d9f1487e89508639edc2905e7017118c0ec1cd82db
                                                                                                                                                                                                                                  • Instruction ID: d45ad4c648fb10770a3f34014536dc83df1b13599ed28869aad4c22a23baeec2
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4a4ffae62088c53692ce58d9f1487e89508639edc2905e7017118c0ec1cd82db
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8B01C03A805205BBCB215BA5EC09AAB7F79FF82731F100219F925921D0DF718905D7B0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 005A9F31
                                                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 005A9F3B
                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 005A9F46
                                                                                                                                                                                                                                  • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 005A9F7A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4127811313-0
                                                                                                                                                                                                                                  • Opcode ID: 5578a038687e2f0bff2ea6d5d4f21dc66948c0897484569aacecb09d2e02025b
                                                                                                                                                                                                                                  • Instruction ID: a50df258e063769a48acc863b38afd84b48810f2e0fc5f85807bdbf2e47dc4d0
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5578a038687e2f0bff2ea6d5d4f21dc66948c0897484569aacecb09d2e02025b
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9711333290026AAFDF15DFA8D8899EE7BB9FB46311F000455FA02E3140D330BA85DBA1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0051604C
                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00516060
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 0051606A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3970641297-0
                                                                                                                                                                                                                                  • Opcode ID: 30323eebe2589afb3f6ad0efc8e340db9e3cd52195892856385bb894bc6ba083
                                                                                                                                                                                                                                  • Instruction ID: b107be61bab182dbec4d44bf95da99212bad452a61abb8ec84958de889274cc6
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 30323eebe2589afb3f6ad0efc8e340db9e3cd52195892856385bb894bc6ba083
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A611AD72501508BFEF129FA48C48EEABFA9FF1D3A4F000206FA0556110C7329CA0EBA1
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 00533B56
                                                                                                                                                                                                                                    • Part of subcall function 00533AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00533AD2
                                                                                                                                                                                                                                    • Part of subcall function 00533AA3: ___AdjustPointer.LIBCMT ref: 00533AED
                                                                                                                                                                                                                                  • _UnwindNestedFrames.LIBCMT ref: 00533B6B
                                                                                                                                                                                                                                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00533B7C
                                                                                                                                                                                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00533BA4
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 737400349-0
                                                                                                                                                                                                                                  • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                  • Instruction ID: f06acc09e4593976fed23c5dc7da80649af29af9ef4ed75e1183013d4221a169
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CC01E932100149BBDF125E95CC4AEEB7F69FF98754F044014FE4866121C736E961DBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,005113C6,00000000,00000000,?,0054301A,005113C6,00000000,00000000,00000000,?,0054328B,00000006,FlsSetValue), ref: 005430A5
                                                                                                                                                                                                                                  • GetLastError.KERNEL32(?,0054301A,005113C6,00000000,00000000,00000000,?,0054328B,00000006,FlsSetValue,005B2290,FlsSetValue,00000000,00000364,?,00542E46), ref: 005430B1
                                                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0054301A,005113C6,00000000,00000000,00000000,?,0054328B,00000006,FlsSetValue,005B2290,FlsSetValue,00000000), ref: 005430BF
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3177248105-0
                                                                                                                                                                                                                                  • Opcode ID: 44481e7845afbf6406d13e7582b9270bbef0e4905ff1adf5a953710904a22a5a
                                                                                                                                                                                                                                  • Instruction ID: f2fed4ac56fc8efa5cff5c1b14f288658ecd53835b938a4d63b369a4f0a037f9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 44481e7845afbf6406d13e7582b9270bbef0e4905ff1adf5a953710904a22a5a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: B4012B36301622ABCB314B789C4CA977FD8BF16B65B200720F90DE7160D721DD09C6E0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0057747F
                                                                                                                                                                                                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00577497
                                                                                                                                                                                                                                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 005774AC
                                                                                                                                                                                                                                  • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 005774CA
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1352324309-0
                                                                                                                                                                                                                                  • Opcode ID: 2196ade24e098f3051b76bb2e59be5ba11d3f95ddb171f1d1f0995e41220346c
                                                                                                                                                                                                                                  • Instruction ID: b428db24a8e2cfd7b177b09b814ab7e5dd40fe082681dfb19efc57fad476ba2b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2196ade24e098f3051b76bb2e59be5ba11d3f95ddb171f1d1f0995e41220346c
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2D115EB52053199BEB208F24FC09F927FFDFB08B04F10C969A66AD6151D7B0E908EB50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0057ACD3,?,00008000), ref: 0057B0C4
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0057ACD3,?,00008000), ref: 0057B0E9
                                                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0057ACD3,?,00008000), ref: 0057B0F3
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0057ACD3,?,00008000), ref: 0057B126
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2875609808-0
                                                                                                                                                                                                                                  • Opcode ID: b169ba9a6fa6bb47b6f596badd9c1977d522f5af8ac7ca63f8567c3d9dd268cc
                                                                                                                                                                                                                                  • Instruction ID: 526469fef58ce4f13997d9a2c1d5ba6b1fd7f46e53ea40b979a20e7d06872028
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b169ba9a6fa6bb47b6f596badd9c1977d522f5af8ac7ca63f8567c3d9dd268cc
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 75117930E01529E7DF00AFE4E9A8BEEBF78FF5A311F008486D945B2181CB305655EB51
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 005A7E33
                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 005A7E4B
                                                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 005A7E6F
                                                                                                                                                                                                                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 005A7E8A
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 357397906-0
                                                                                                                                                                                                                                  • Opcode ID: 1e280e3c56aff32b69bdec5bdec9877c5820dc004cf936003eb9f78ae03001e2
                                                                                                                                                                                                                                  • Instruction ID: 60e71a56bc2d3062af58670129db9526be670adbc4404685b15ec6916335ba2f
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1e280e3c56aff32b69bdec5bdec9877c5820dc004cf936003eb9f78ae03001e2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7D1143B9D0020AAFDB41CFA8C8849EEBBF9FB19310F505056E915E3210D735AA54DF90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00572DC5
                                                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00572DD6
                                                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00572DDD
                                                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00572DE4
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2710830443-0
                                                                                                                                                                                                                                  • Opcode ID: 344b7d775e18aee94c14438d19be04ade4602f15936627034996f612069c5f11
                                                                                                                                                                                                                                  • Instruction ID: 95905d093804b29c87b2925ec2f55ab28fb7749f35a8b20dd49f0099a903da29
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 344b7d775e18aee94c14438d19be04ade4602f15936627034996f612069c5f11
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 38E092B16012347BD7305B76AC0DFEB3E6CFF63BA1F004015F109D20809AA0C845E6B0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00529639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00529693
                                                                                                                                                                                                                                    • Part of subcall function 00529639: SelectObject.GDI32(?,00000000), ref: 005296A2
                                                                                                                                                                                                                                    • Part of subcall function 00529639: BeginPath.GDI32(?), ref: 005296B9
                                                                                                                                                                                                                                    • Part of subcall function 00529639: SelectObject.GDI32(?,00000000), ref: 005296E2
                                                                                                                                                                                                                                  • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 005A8887
                                                                                                                                                                                                                                  • LineTo.GDI32(?,?,?), ref: 005A8894
                                                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 005A88A4
                                                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 005A88B2
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1539411459-0
                                                                                                                                                                                                                                  • Opcode ID: 86e18fa264ac55a03956f98fa905e907e81f48d66c16808471dbced522369982
                                                                                                                                                                                                                                  • Instruction ID: 90fb1ba7bc6ae5c7aaccbfeb9de6460cc5d76bdcd182896492d68d60d2a58c1b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 86e18fa264ac55a03956f98fa905e907e81f48d66c16808471dbced522369982
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: ABF03A36045659BADB125F94AC0DFDE3E59BF27310F448000FA11650E2CB795515EBA9
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetSysColor.USER32(00000008), ref: 005298CC
                                                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 005298D6
                                                                                                                                                                                                                                  • SetBkMode.GDI32(?,00000001), ref: 005298E9
                                                                                                                                                                                                                                  • GetStockObject.GDI32(00000005), ref: 005298F1
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 4037423528-0
                                                                                                                                                                                                                                  • Opcode ID: fdf6603537d52c9d4adb0155221fe6a5cb8cc3c0d570d87573f395080bf49304
                                                                                                                                                                                                                                  • Instruction ID: babda23092f530fcf023f160b2149b06ff6ffa12fd385980bdd04a0b603c7173
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: fdf6603537d52c9d4adb0155221fe6a5cb8cc3c0d570d87573f395080bf49304
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 77E06D31644284ABDB215B74BC09BE83F60FB27336F048219F6FA581E1C7724684EB10
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetCurrentThread.KERNEL32 ref: 00571634
                                                                                                                                                                                                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,005711D9), ref: 0057163B
                                                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,005711D9), ref: 00571648
                                                                                                                                                                                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,005711D9), ref: 0057164F
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 3974789173-0
                                                                                                                                                                                                                                  • Opcode ID: 6d78daf8af01a9f0b2d155c7cc239e2065791bb06a459dc144e30e1677b3d84a
                                                                                                                                                                                                                                  • Instruction ID: 9fd6a7abfb0923c10368a160921ec55014196553daf74aa5e51fb240e99b5b65
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6d78daf8af01a9f0b2d155c7cc239e2065791bb06a459dc144e30e1677b3d84a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 70E08635601211DBD7201FA5AD0DB4B3F7CBF66791F148808F245C9080D6344548E754
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 0056D858
                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 0056D862
                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0056D882
                                                                                                                                                                                                                                  • ReleaseDC.USER32(?), ref: 0056D8A3
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2889604237-0
                                                                                                                                                                                                                                  • Opcode ID: fe3f31decb965d1eff72b2794d78ec19c2547cf145b65ae4249fd8c78f015923
                                                                                                                                                                                                                                  • Instruction ID: ca8919bc23010366900ac9e3378c651b0e0ab707e0499b170370e9ed39fb7596
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: fe3f31decb965d1eff72b2794d78ec19c2547cf145b65ae4249fd8c78f015923
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 69E01AB4800205DFCB419FA4D80C66DBFB1FB19310F108409E806E7350CB388945AF50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 0056D86C
                                                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 0056D876
                                                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0056D882
                                                                                                                                                                                                                                  • ReleaseDC.USER32(?), ref: 0056D8A3
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 2889604237-0
                                                                                                                                                                                                                                  • Opcode ID: 587933b3dbc702fa7ea6e77ed2ba42330fd5dfb5924db8b132cafcaaa00c6018
                                                                                                                                                                                                                                  • Instruction ID: 967b2f4171f1099f455d179a3d3f2215e27ba0317e127c4cc6dd779dd11b1383
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 587933b3dbc702fa7ea6e77ed2ba42330fd5dfb5924db8b132cafcaaa00c6018
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 78E012B4800204EFCB41AFA4D80C66EBFB1BB19310B108408E80AE7360CB38990AAF50
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                                                                                                                                                                                                  • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00584ED4
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Connection_wcslen
                                                                                                                                                                                                                                  • String ID: *$LPT
                                                                                                                                                                                                                                  • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                  • Opcode ID: 31dac028967185e3ec218c0345fa40a42418559712cfc114a86243a03fe5c98f
                                                                                                                                                                                                                                  • Instruction ID: ec4d1fe4e7100715e07138861d22498cf32366a0cc2e57413c7249f885553b84
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 31dac028967185e3ec218c0345fa40a42418559712cfc114a86243a03fe5c98f
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: BB914A75A002059FDB14EF58C484AAABFB5BF48304F198099ED0AAB362D731ED85CF91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 0053E30D
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ErrorHandling__start
                                                                                                                                                                                                                                  • String ID: pow
                                                                                                                                                                                                                                  • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                  • Opcode ID: a521351e38fd914cd9748babc6443914a3f291837160b753a9f2b414ba0853ca
                                                                                                                                                                                                                                  • Instruction ID: 3c105a0531dd9e4f1d239972786d0b5c7827b106ddec0575143a0e72a3a4b853
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: a521351e38fd914cd9748babc6443914a3f291837160b753a9f2b414ba0853ca
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5E515971E1C20A96CB157724C9473FA3FE8FB54744F208E98E095832E9EB309C95AA46
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(0056569E,00000000,?,005ACC08,?,00000000,00000000), ref: 005978DD
                                                                                                                                                                                                                                    • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(0056569E,00000000,?,005ACC08,00000000,?,00000000,00000000), ref: 0059783B
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: BuffCharUpper$_wcslen
                                                                                                                                                                                                                                  • String ID: <s]
                                                                                                                                                                                                                                  • API String ID: 3544283678-3287859866
                                                                                                                                                                                                                                  • Opcode ID: 6182392611b613d64539e4d75c28e1b8f7fd0a17099e032b753739e8bd8e7c2a
                                                                                                                                                                                                                                  • Instruction ID: f78ab4f2a3c13ab3eb41a6b18f90cb29e4d93f20758be01d84cf36e5052db489
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6182392611b613d64539e4d75c28e1b8f7fd0a17099e032b753739e8bd8e7c2a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C9616B7292411AAADF04EBA4CC95DFDBB78FF58300F540926E542A3191EF306A85DBA0
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                                                  • String ID: #
                                                                                                                                                                                                                                  • API String ID: 0-1885708031
                                                                                                                                                                                                                                  • Opcode ID: ebd096cdad5b00089a014a309f1720a9cd61dbfbeafd85f61edb94e74676f74a
                                                                                                                                                                                                                                  • Instruction ID: 66adfff15f52614cec2f1f134505b049b2068563e8ecacdaee075e01aa8943b8
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: ebd096cdad5b00089a014a309f1720a9cd61dbfbeafd85f61edb94e74676f74a
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A1513339502296DFDF15DF28D086AFA7FA8FF66310F644055E8929B2C0D6349D82CBA0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 0052F2A2
                                                                                                                                                                                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0052F2BB
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                                                  • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                  • Opcode ID: c74dde67e1f6d21e205f5e19fd96fb59d69fa193dacbb454621c85b518957ae6
                                                                                                                                                                                                                                  • Instruction ID: c7a2995c9ab9ec5f6a5ad5f1cdfd9c427da7dc9de0f0fd6f0e4bc561255378ce
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c74dde67e1f6d21e205f5e19fd96fb59d69fa193dacbb454621c85b518957ae6
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 95514971408B499BE320AF14DC8ABABBBF8FFD9300F81485DF1D941195EB318569CB66
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 005957E0
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 005957EC
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                  • String ID: CALLARGARRAY
                                                                                                                                                                                                                                  • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                  • Opcode ID: 542c1432e0951ba05dcc4fb301acbd54f41edbbbf92c58c95735c4e1b51b50d2
                                                                                                                                                                                                                                  • Instruction ID: 1c137534ec4c76d0c473b9da2367f8f55f118cdcbbcc352f0b521fcfa437f5d1
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 542c1432e0951ba05dcc4fb301acbd54f41edbbbf92c58c95735c4e1b51b50d2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 42418071A0010A9FCF15DFA9D8899EEBFF5FF99320F244069E505A7291E7309D91CB90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 0058D130
                                                                                                                                                                                                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0058D13A
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                  • String ID: |
                                                                                                                                                                                                                                  • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                  • Opcode ID: 8dc1b1c69ce2af2d77bf59b796b38f88908ad9efa361b3b3ab525f61b27950a0
                                                                                                                                                                                                                                  • Instruction ID: 20de1884158e0cb95b0cdf2d8ee3d4ff1b41bc96ce37ac12595cdfae6ab8a7f9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8dc1b1c69ce2af2d77bf59b796b38f88908ad9efa361b3b3ab525f61b27950a0
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 91311A71D0020AABDF15EFA4CC89AEFBFB9FF44300F000119F815A6165DB31AA56DB60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • DestroyWindow.USER32(?,?,?,?), ref: 005A3621
                                                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 005A365C
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$DestroyMove
                                                                                                                                                                                                                                  • String ID: static
                                                                                                                                                                                                                                  • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                  • Opcode ID: 122e22337bc0781ba20589693aa950e43beab676233fb604c540f61636c4bd61
                                                                                                                                                                                                                                  • Instruction ID: ec25a2110fa329503b0883681e4de8e28bc733ad666cfcda874b9030258fb835
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 122e22337bc0781ba20589693aa950e43beab676233fb604c540f61636c4bd61
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2231AD71500204AEEB109F68DC84EFF7BA9FF89724F008619F8A597280DA31AD81D760
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 005A461F
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005A4634
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                                                  • String ID: '
                                                                                                                                                                                                                                  • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                  • Opcode ID: b4c3178dca700e86665d0cc00e29ceb6bbc411a83cd23056dbacc146c5d51745
                                                                                                                                                                                                                                  • Instruction ID: cf6a83b4df17a8db4cdfa2242298cf86384d68b0ab00f160ebbea7432901c601
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b4c3178dca700e86665d0cc00e29ceb6bbc411a83cd23056dbacc146c5d51745
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 11310774A0120A9FDB14CFA9C990BEE7BB5FF8A300F14446AE905AB351D7B0A941DF90
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 005A327C
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A3287
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                                                  • String ID: Combobox
                                                                                                                                                                                                                                  • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                  • Opcode ID: 15a5f86fe614abad92210b838aafd138aa582b47e32194301fab63345ff049fc
                                                                                                                                                                                                                                  • Instruction ID: 2066e20eb525f80fa94064adbde64d5f5ed8f3dafd71121173266e5b07c47926
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 15a5f86fe614abad92210b838aafd138aa582b47e32194301fab63345ff049fc
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CF11D0752002086FEF219E94DC84FBF3F6AFF9A3A8F100125F9189B290D6319D5197A0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0051600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0051604C
                                                                                                                                                                                                                                    • Part of subcall function 0051600E: GetStockObject.GDI32(00000011), ref: 00516060
                                                                                                                                                                                                                                    • Part of subcall function 0051600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0051606A
                                                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005A377A
                                                                                                                                                                                                                                  • GetSysColor.USER32(00000012), ref: 005A3794
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                  • String ID: static
                                                                                                                                                                                                                                  • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                  • Opcode ID: 43475b6a7eb57b70b17046f5870abbcdfba026bbd09eba550e85b5845f200ab2
                                                                                                                                                                                                                                  • Instruction ID: 134114b73b3ec6008c4fdbef1b1a556f0835499b4b2661c04ee85addd2195076
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 43475b6a7eb57b70b17046f5870abbcdfba026bbd09eba550e85b5845f200ab2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7B1129B261020AAFDB00DFA8CC45EFE7BF8FB09354F004914F955E2250E735E9559B60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0058CD7D
                                                                                                                                                                                                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0058CDA6
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Internet$OpenOption
                                                                                                                                                                                                                                  • String ID: <local>
                                                                                                                                                                                                                                  • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                  • Opcode ID: cf2ae006d965c32106c1efc617839c36901c7fc09f0c90bbf92d7c5d563d3e4c
                                                                                                                                                                                                                                  • Instruction ID: fb1ba8f2978b495ded9addbb0a05f2c7d65b8cdca9bcddf79a4e286ef4275730
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: cf2ae006d965c32106c1efc617839c36901c7fc09f0c90bbf92d7c5d563d3e4c
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A811C671206671BAD7347B668C45EE7BEACFF127A4F00462AB909A3180D7709845D7F0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 005A34AB
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 005A34BA
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                                  • String ID: edit
                                                                                                                                                                                                                                  • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                                  • Opcode ID: 32e96a35f1f56fee2827c0d10b76a75478074af331fc01c2f331f47d7758c70d
                                                                                                                                                                                                                                  • Instruction ID: 9d9a95a7db6a4abb988c022aa4904b02f30f53cebd6b163eaa9ec8997abdc26b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 32e96a35f1f56fee2827c0d10b76a75478074af331fc01c2f331f47d7758c70d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 52116D71500208AFEF118E64DC48AAF3F6AFB5A378F504724FA61971D0C771DC959B60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?,?), ref: 00576CB6
                                                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00576CC2
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                  • String ID: STOP
                                                                                                                                                                                                                                  • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                  • Opcode ID: 48ef831d5bccab33e5c52a4888385ecd87bd05b936b692faa66cfa2d71c84213
                                                                                                                                                                                                                                  • Instruction ID: 3d49b2ca4b2bfd66e2ba967bda0ef6c6f227092774e8f1505fe71e82b8efa2d0
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 48ef831d5bccab33e5c52a4888385ecd87bd05b936b692faa66cfa2d71c84213
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: C30104326109278ACB219FBDEC849FF3FA8FAA1710B504924E85697190EB31DD40D650
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00571D4C
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                  • Opcode ID: 61515f577900a0b1658e153a8864883cc219f3891f7cfca2c53f4e1eb5d5e1b2
                                                                                                                                                                                                                                  • Instruction ID: 56c65606ad72fa43332b8947cc37f72f61f05648d94eab46ad98a48e6579370e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 61515f577900a0b1658e153a8864883cc219f3891f7cfca2c53f4e1eb5d5e1b2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 06012831600215ABDB24EFA8DC55CFE7F68FF82390F00491AF866573C1EA305908AA60
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00571C46
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                  • Opcode ID: efe651c9493d0f528e7c4a7d4f627ef353659f84160671756b816cbee4653579
                                                                                                                                                                                                                                  • Instruction ID: 1ed53540a4fb225e058c0ca27bc0fbcb6ae22f75b40d3c3dadd142d70f95ccc8
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: efe651c9493d0f528e7c4a7d4f627ef353659f84160671756b816cbee4653579
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1401FC7164010566DB15E7D4D95A9FF7FACBF51340F200016A80A672C1EA209E08A6B5
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00571CC8
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                  • Opcode ID: 5236eee65be101673e819480d9aa51cae9b5e414ae6b3e37adac3c6d15ee0cc8
                                                                                                                                                                                                                                  • Instruction ID: 8e6eb290ae1d6c6b4aab50148884e3fb06073902ca1ef74948d86ff6d13b0da8
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5236eee65be101673e819480d9aa51cae9b5e414ae6b3e37adac3c6d15ee0cc8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: CC012B7164051567DB15EBD8DA16AFE7FACBF51380F104016B84677281EA208F08E2B5
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 0052A529
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Init_thread_footer_wcslen
                                                                                                                                                                                                                                  • String ID: ,%^$3yV
                                                                                                                                                                                                                                  • API String ID: 2551934079-817577063
                                                                                                                                                                                                                                  • Opcode ID: 3d492e377663612434aeece31e17e115a4dd26e799b10a603d7cd03b3f516d98
                                                                                                                                                                                                                                  • Instruction ID: 7c970d733234b0c6971b9745d9ffd2b6b1bc791d4476596c126bdaaeb97af815
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3d492e377663612434aeece31e17e115a4dd26e799b10a603d7cd03b3f516d98
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6401F73270066197CE08F768E86FA9E7F68BF86710F401425F9025B1C2DE509D458AD7
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                                                                                                                                                                                                    • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00571DD3
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                  • Opcode ID: c1906120f15ece6188a70272699d37bdf878a5bdd94cb6e4fbb33a2b7b03104e
                                                                                                                                                                                                                                  • Instruction ID: 71db3bd30f6f6bb1b2676e8472bfb60ce74419c7ba3cd27692c5cc23827dc00c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: c1906120f15ece6188a70272699d37bdf878a5bdd94cb6e4fbb33a2b7b03104e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: DCF04970A0021566E714E7A8DC56BFE7F6CBF42390F040816B866632C1EA205D0896A0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,005E3018,005E305C), ref: 005A81BF
                                                                                                                                                                                                                                  • CloseHandle.KERNEL32 ref: 005A81D1
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                                                  • String ID: \0^
                                                                                                                                                                                                                                  • API String ID: 3712363035-3379709126
                                                                                                                                                                                                                                  • Opcode ID: 32db07969f3fce4702b68c3c4357e8697df40c1f1b821e513b0bd5300fc3f239
                                                                                                                                                                                                                                  • Instruction ID: 199575348d26d12ddfc890ce9e6295e2c54b067e2b0307b05e0c5fef0570b743
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 32db07969f3fce4702b68c3c4357e8697df40c1f1b821e513b0bd5300fc3f239
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: AAF089B1640340BEE7246761AC4DFB73E9CEB15750F000461FB48DB1A1D6758E14A3F4
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                                                  • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                                  • API String ID: 176396367-3042988571
                                                                                                                                                                                                                                  • Opcode ID: b97c82e97b9f76108d7faa4ffa72d9c8ab74e129d18355eba94377ff6c9fba8e
                                                                                                                                                                                                                                  • Instruction ID: 0dbe8ab5f30028e2020a1f2af57ed84f5bd2056c98449352165aaefa24bcd8b5
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b97c82e97b9f76108d7faa4ffa72d9c8ab74e129d18355eba94377ff6c9fba8e
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5FE02B03225321109B3112799CC5B7F5F8DFFCD760B14182BF989C2267EAA49D9193A0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00570B23
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Message
                                                                                                                                                                                                                                  • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                  • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                  • Opcode ID: 47f77a3db29c393022b32a0e9ffa64ebb20c4000b6e52fc7574fff76f6c69393
                                                                                                                                                                                                                                  • Instruction ID: 7e4c69ad8a3154ecb3eab911f476bee69323bb0faac76fd07e8a519cd20152dc
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 47f77a3db29c393022b32a0e9ffa64ebb20c4000b6e52fc7574fff76f6c69393
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8AE0D8322443192AD31437547C07F8D7FC8FF06B20F10042BF758555C38EE1689056A9
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                    • Part of subcall function 0052F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00530D71,?,?,?,0051100A), ref: 0052F7CE
                                                                                                                                                                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,0051100A), ref: 00530D75
                                                                                                                                                                                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0051100A), ref: 00530D84
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00530D7F
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                  • API String ID: 55579361-631824599
                                                                                                                                                                                                                                  • Opcode ID: aea7f27dbaea130a961ef3b5b8875058a0ec245fa07bdaa42d00e76bec545277
                                                                                                                                                                                                                                  • Instruction ID: 928c34918856d7bb29dd197693750a8d2d268d4c437d567f50edcac5761334f2
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: aea7f27dbaea130a961ef3b5b8875058a0ec245fa07bdaa42d00e76bec545277
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A8E06D742007518BD7609FB8E41834A7FE4BF15744F004D2DE4C2C6691DBB0E4889B91
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 0052E3D5
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Init_thread_footer
                                                                                                                                                                                                                                  • String ID: 0%^$8%^
                                                                                                                                                                                                                                  • API String ID: 1385522511-2219163478
                                                                                                                                                                                                                                  • Opcode ID: 9d555d80d306128dcd2a2438f01b95a601c879dab61278852ec3b23f3fed72d9
                                                                                                                                                                                                                                  • Instruction ID: 109e54cbb7a2779ec71da4751c73cd58f25d60cdef7062a304f4a2b57a14564b
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9d555d80d306128dcd2a2438f01b95a601c879dab61278852ec3b23f3fed72d9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E9E02631400BB4CBC60CD718FAAAA8C3B99BF66321F1019AAE0828F1DDDBB038419654
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0058302F
                                                                                                                                                                                                                                  • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00583044
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                  • String ID: aut
                                                                                                                                                                                                                                  • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                  • Opcode ID: 038fd748eb899c10e404d46cb98af4203e423808cc145bea8e3fd1be1bbd4c8d
                                                                                                                                                                                                                                  • Instruction ID: 6349e2c1f7829ac0352a18ac60e74142055a2daec3e7fff74015cc1ae81553e9
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 038fd748eb899c10e404d46cb98af4203e423808cc145bea8e3fd1be1bbd4c8d
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 27D05B7550031467DB3097949D0DFC73F6CDB05750F0001927795D2091DAB09544CAD0
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: LocalTime
                                                                                                                                                                                                                                  • String ID: %.3d$X64
                                                                                                                                                                                                                                  • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                  • Opcode ID: b8409e17d4200147f0b9e367c3f296fab4efbdfc5dee24edf01ed9c74ccb4cf2
                                                                                                                                                                                                                                  • Instruction ID: 729f93c779faf7c5fefaa4e5baeb76e7960134e890187afc99c36b062005929c
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: b8409e17d4200147f0b9e367c3f296fab4efbdfc5dee24edf01ed9c74ccb4cf2
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 08D012B9D08119EACB9096D0DC599B9BF7CBF19301F508C63F80693040E728C5086771
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005A236C
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000), ref: 005A2373
                                                                                                                                                                                                                                    • Part of subcall function 0057E97B: Sleep.KERNEL32 ref: 0057E9F3
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                  • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                  • Opcode ID: 7b2092d33540409cbf0eaf3ec833ed144daefd482c603b64476492f20de3fcf9
                                                                                                                                                                                                                                  • Instruction ID: ec4612f7faff35dbf9ca8e59b975b5bf59650b54b771ba011fdf326b28704b8e
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b2092d33540409cbf0eaf3ec833ed144daefd482c603b64476492f20de3fcf9
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6DD0C9327813147AE674A774AC0FFC67E14AB6AB10F0049167755AA1D0C9A0A8059A54
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005A232C
                                                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 005A233F
                                                                                                                                                                                                                                    • Part of subcall function 0057E97B: Sleep.KERNEL32 ref: 0057E9F3
                                                                                                                                                                                                                                  Strings
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                  • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                  • Opcode ID: 0c05fbe7688509eec5cb5da9749bcd971773cbf62077507603128322a26c8ae8
                                                                                                                                                                                                                                  • Instruction ID: 8de9d5149be15e572fdd04aa17f7a7b24b8beb12ead648874b83316531c9eaa7
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0c05fbe7688509eec5cb5da9749bcd971773cbf62077507603128322a26c8ae8
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: E8D0C936794314BAE674A774AC0FFC67E14AB66B10F0049167759AA1D0C9A0A8059A54
                                                                                                                                                                                                                                  APIs
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0054BE93
                                                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 0054BEA1
                                                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0054BEFC
                                                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                                                  • Source File: 00000000.00000002.1750134441.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750102127.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750220017.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750292043.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  • Associated: 00000000.00000002.1750319822.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_510000_file.jbxd
                                                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                                                  • API String ID: 1717984340-0
                                                                                                                                                                                                                                  • Opcode ID: 7aadc3fd7e1c94f39ff6b3d1abf2761b74e65f37c85b50beb53bc8cc30d48b33
                                                                                                                                                                                                                                  • Instruction ID: d452c11331f3303bf01371c9cfd767e24b744700ee79f0f7602882199bd2f8ef
                                                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7aadc3fd7e1c94f39ff6b3d1abf2761b74e65f37c85b50beb53bc8cc30d48b33
                                                                                                                                                                                                                                  • Instruction Fuzzy Hash: A141C234604206BBEF258F65CC88AEA7FA9BF82314F144169F95D971A2DB31CD05DB50